Protocol Attack

Revision as of 22:20, 2 April 2024 by Christiane (talk | contribs) (added Category:Articles to be expanded using HotCat)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types edit

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms edit

  • Fake Traffic[4]

References edit