Difference between revisions of "Protocol Attack"
Jump to navigation
Jump to search
(Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs....") |
Christiane (talk | contribs) m (added Category:Articles to be expanded using HotCat) |
||
(One intermediate revision by one other user not shown) | |||
Line 9: | Line 9: | ||
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | * Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | ||
==References== | ==References== | ||
+ | |||
+ | [[Category:DNS Abuse]] | ||
+ | [[Category:Articles to be expanded]] |
Latest revision as of 22:20, 2 April 2024
A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]
Types
- A New Cell-Counting-Based Attack Against Tor[3]
Defense Mechanisms
- Fake Traffic[4]
References
- ↑ [http://www.cs.unc.edu/~jeffay/courses/nidsS05/slides/5-Protocol-Attacks.pdf Sushant Rewaskar, Protocol Attacks, UNC}
- ↑ DNS Attacks List
- ↑ [https://ieeexplore.ieee.org/document/6132443 "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Transactions on Networking
- ↑ Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process