Attacks/Threat Name

Mitigating Algorithm

Zombie Attack

Algorithm 1

DoS/DDoS

Back door Attack

Reply Attack

Algorithm 2

Authentication

Unbalanced RSA