Jump to content

Protocol Attack: Difference between revisions

From ICANNWiki
Jessica (talk | contribs)
Christiane (talk | contribs)
 
Line 11: Line 11:


[[Category:DNS Abuse]]
[[Category:DNS Abuse]]
[[Category:Articles to be expanded]]

Latest revision as of 22:20, 2 April 2024

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types[edit | edit source]

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms[edit | edit source]

  • Fake Traffic[4]

References[edit | edit source]