all InfoSec news
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing. (arXiv:2110.00407v2 [cs.CR] UPDATED)
Jan. 27, 2022, 2:20 a.m. | Fabio Streun, Joel Wanner, Adrian Perrig
cs.CR updates on arXiv.org arxiv.org
Many systems today rely heavily on virtual private network (VPN) technology
to connect networks and protect their services on the Internet. While prior
studies compare the performance of different implementations, they do not
consider adversarial settings. To address this gap, we evaluate the resilience
of VPN implementations to flooding-based denial-of-service (DoS) attacks. We
focus on a class of stateless flooding attacks, which are particularly
threatening to real connections, as they can be carried out by an off-path
attacker using spoofed …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
IT Security Manager
@ Teltonika | Vilnius/Kaunas, VL, LT
Security Officer - Part Time - Harrah's Gulf Coast
@ Caesars Entertainment | Biloxi, MS, United States
DevSecOps Full-stack Developer
@ Peraton | Fort Gordon, GA, United States
Cybersecurity Cooperation Lead
@ Peraton | Stuttgart, AE, United States
Cybersecurity Engineer - Malware & Forensics
@ ManTech | 201DU - Customer Site,Herndon, VA