An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks.
Benjamin TeyssierY. A JoarderCarol FungPublished in: CNSM (2023)
Keyphrases
- cryptographic protocols
- security protocols
- secure routing
- denial of service attacks
- lightweight
- security properties
- countermeasures
- cryptographic algorithms
- wireless sensor networks
- traffic analysis
- security threats
- river basin
- formal analysis
- watermarking scheme
- communication protocol
- attack scenarios
- ad hoc networks
- decision making
- residual energy
- chosen plaintext
- attack detection
- malicious attacks
- dos attacks
- security analysis
- fault tolerance
- routing protocol
- missing data