QUIC
This dataset contains results and scripts from experiments evaluating the resilience of the QUIC protocol against handshake flooding attacks. It aims to support researchers and developers in analyzing the performance of QUIC against handshake flooding attacks. The experiments utilize three prominent QUIC implementations: aioquic, quic-go, and picoquic, providing a comprehensive comparison of their resilience. Additionally, to benchmark the performance and resilience of QUIC, SYN flood attacks were conducted against TCP with SYN cookies.
- Categories:

Moving away from plain-text DNS communications,
users now have the option of using encrypted DNS protocols
for domain name resolutions. DNS-over-QUIC (DoQ) employs
QUIC—the latest transport protocol—for encrypted communi-
cations between users and their recursive DNS servers. QUIC is
also poised to become the foundation of our daily web browsing
experience by replacing TCP with HTTPP/3, the latest version
of the HTTP protocol.
Traditional TCP-based web browsing is vulnerable to website
- Categories: