Protocol Attack: Difference between revisions
Appearance
Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs...." |
m added Category:DNS Abuse using HotCat |
||
Line 9: | Line 9: | ||
* Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | * Fake Traffic<ref>[https://www.sciencedirect.com/science/article/pii/S1110866517301457 Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process]</ref> | ||
==References== | ==References== | ||
[[Category:DNS Abuse]] |
Revision as of 16:34, 27 July 2021
A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]
Types[edit | edit source]
- A New Cell-Counting-Based Attack Against Tor[3]
Defense Mechanisms[edit | edit source]
- Fake Traffic[4]
References[edit | edit source]
- ↑ [http://www.cs.unc.edu/~jeffay/courses/nidsS05/slides/5-Protocol-Attacks.pdf Sushant Rewaskar, Protocol Attacks, UNC}
- ↑ DNS Attacks List
- ↑ [https://ieeexplore.ieee.org/document/6132443 "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Transactions on Networking
- ↑ Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process