Jan. 27, 2022, 2:20 a.m. | Fabio Streun, Joel Wanner, Adrian Perrig

cs.CR updates on arXiv.org arxiv.org

Many systems today rely heavily on virtual private network (VPN) technology
to connect networks and protect their services on the Internet. While prior
studies compare the performance of different implementations, they do not
consider adversarial settings. To address this gap, we evaluate the resilience
of VPN implementations to flooding-based denial-of-service (DoS) attacks. We
focus on a class of stateless flooding attacks, which are particularly
threatening to real connections, as they can be carried out by an off-path
attacker using spoofed …

attacks dos testing vpn

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA