Jump to content

Protocol Attack: Difference between revisions

From ICANNWiki
Jessica (talk | contribs)
Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs...."
 
Christiane (talk | contribs)
 
(One intermediate revision by one other user not shown)
Line 9: Line 9:
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref>
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref>
==References==
==References==
[[Category:DNS Abuse]]
[[Category:Articles to be expanded]]

Latest revision as of 22:20, 2 April 2024

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types[edit | edit source]

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms[edit | edit source]

  • Fake Traffic[4]

References[edit | edit source]