Protocol Attack
Appearance
A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]
Types edit
- A New Cell-Counting-Based Attack Against Tor[3]
Defense Mechanisms edit
- Fake Traffic[4]
References edit
- ↑ [http://www.cs.unc.edu/~jeffay/courses/nidsS05/slides/5-Protocol-Attacks.pdf Sushant Rewaskar, Protocol Attacks, UNC}
- ↑ DNS Attacks List
- ↑ [https://ieeexplore.ieee.org/document/6132443 "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Transactions on Networking
- ↑ Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process