Protocol Attack

Revision as of 16:33, 27 July 2021 by Jessica (talk | contribs) (Created page with "A '''Protocol Attack''' exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.<ref>[http://www.cs....")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types edit

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms edit

  • Fake Traffic[4]

References edit