Difference between revisions of "Protocol Attack"

From ICANNWiki
Jump to navigation Jump to search
(Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs....")
 
 
(One intermediate revision by one other user not shown)
Line 9: Line 9:
 
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref>
 
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref>
 
==References==
 
==References==
 +
 +
[[Category:DNS Abuse]]
 +
[[Category:Articles to be expanded]]

Latest revision as of 22:20, 2 April 2024

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms

  • Fake Traffic[4]

References