Attacks/Threat Name
Mitigating Algorithm
Zombie Attack
Algorithm 1
DoS/DDoS
Back door Attack
Reply Attack
Algorithm 2
Authentication
Unbalanced RSA