Protocol Attack: Difference between revisions
Appearance
Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs...." |
Christiane (talk | contribs) m added Category:Articles to be expanded using HotCat |
||
(One intermediate revision by one other user not shown) | |||
Line 9: | Line 9: | ||
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | * Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | ||
==References== | ==References== | ||
[[Category:DNS Abuse]] | |||
[[Category:Articles to be expanded]] |
Latest revision as of 22:20, 2 April 2024
A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]
Types[edit | edit source]
- A New Cell-Counting-Based Attack Against Tor[3]
Defense Mechanisms[edit | edit source]
- Fake Traffic[4]
References[edit | edit source]
- ↑ [http://www.cs.unc.edu/~jeffay/courses/nidsS05/slides/5-Protocol-Attacks.pdf Sushant Rewaskar, Protocol Attacks, UNC}
- ↑ DNS Attacks List
- ↑ [https://ieeexplore.ieee.org/document/6132443 "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Transactions on Networking
- ↑ Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process