Web: http://arxiv.org/abs/2110.00407

Jan. 27, 2022, 2:20 a.m. | Fabio Streun, Joel Wanner, Adrian Perrig

cs.CR updates on arXiv.org arxiv.org

Many systems today rely heavily on virtual private network (VPN) technology
to connect networks and protect their services on the Internet. While prior
studies compare the performance of different implementations, they do not
consider adversarial settings. To address this gap, we evaluate the resilience
of VPN implementations to flooding-based denial-of-service (DoS) attacks. We
focus on a class of stateless flooding attacks, which are particularly
threatening to real connections, as they can be carried out by an off-path
attacker using spoofed …

attacks dos testing vpn

More from arxiv.org / cs.CR updates on arXiv.org

Senior Incident Responder

@ CipherTechs, Inc. | Remote

Data Security DevOps Engineer Senior/Intermediate

@ University of Michigan - ITS | Ann Arbor, MI

Senior Penetration Tester

@ CipherTechs, Inc. | Remote

Data Analyst

@ SkyePoint Decisions | Washington, DC

POA&M Analyst

@ SkyePoint Decisions | Washington, DC

PKI Systems Engineer

@ SkyePoint Decisions | Springfield, VA