CAPEC-125: Flooding

Meta Stable 严重程度: Medium 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adversary can make in a given period of time. The greater this number, the more likely an attack is to succeed against a given target.

前提条件

  • Any target that services requests is vulnerable to this attack on some level of scale.

所需资源

  • A script or program capable of generating more requests than the target can handle, or a network or cluster of objects all capable of making simultaneous requests.

后果影响

影响范围: Availability

技术影响: Unreliable Execution

说明: A successful flooding attack compromises the availability of the target system's service by exhausting its available resources.

缓解措施

Ensure that protocols have specific limits of scale configured.

Specify expectations for capabilities and dictate which behaviors are acceptable when resource allocation reaches limits.

Uniformly throttle all requests in order to make it more difficult to consume resources more quickly than they can again be freed.

分类映射

分类名称 条目ID 条目名称
ATTACK 1498.001 Network Denial of Service: Direct Network Flood
ATTACK 1499 Endpoint Denial of Service
WASC 10 Denial of Service
OWASP Attacks - Traffic flood
关键信息

CAPEC ID: CAPEC-125

抽象级别: Meta

状态: Stable

典型严重程度: Medium

攻击可能性: High

相关CWE弱点