Protocol Attack: Difference between revisions
Appearance
m added Category:DNS Abuse using HotCat |
Christiane (talk | contribs) m added Category:Articles to be expanded using HotCat |
||
Line 11: | Line 11: | ||
[[Category:DNS Abuse]] | [[Category:DNS Abuse]] | ||
[[Category:Articles to be expanded]] |
Latest revision as of 22:20, 2 April 2024
A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]
Types[edit | edit source]
- A New Cell-Counting-Based Attack Against Tor[3]
Defense Mechanisms[edit | edit source]
- Fake Traffic[4]
References[edit | edit source]
- ↑ [http://www.cs.unc.edu/~jeffay/courses/nidsS05/slides/5-Protocol-Attacks.pdf Sushant Rewaskar, Protocol Attacks, UNC}
- ↑ DNS Attacks List
- ↑ [https://ieeexplore.ieee.org/document/6132443 "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Transactions on Networking
- ↑ Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process