CAPEC-482: TCP Flood

Standard Draft

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary may execute a flooding attack using the TCP protocol with the intent to deny legitimate users access to a service. These attacks exploit the weakness within the TCP protocol where there is some state information for the connection the server needs to maintain. This often involves the use of TCP SYN messages.

前提条件

  • This type of an attack requires the ability to generate a large amount of TCP traffic to send to the target port of a functioning server.

缓解措施

To mitigate this type of an attack, an organization can monitor incoming packets and look for patterns in the TCP traffic to determine if the network is under an attack. The potential target may implement a rate limit on TCP SYN messages which would provide limited capabilities while under attack.

分类映射

分类名称 条目ID 条目名称
ATTACK 1498.001 Network Denial of Service: Direct Network Flood
ATTACK 1499.001 Endpoint Denial of Service: OS Exhaustion Flood
ATTACK 1499.002 Endpoint Denial of Service: Service Exhaustion Flood
关键信息

CAPEC ID: CAPEC-482

抽象级别: Standard

状态: Draft

相关攻击模式
相关CWE弱点