Jump to content

Protocol Attack

This article needs attention. Please help improve it by revising the article in accordance with ICANNWiki's content guidelines. In particular, ensure a neutral point of view and proper sourcing of information.

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types

[edit | edit source]
  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms

[edit | edit source]
  • Fake Traffic[4]

References

[edit | edit source]