6. of Denial of Service II
An attacker can make a server unavailable or unusable without ever authenticating, but the problem goes away when the attacker stops (server, anonymous, temporary).
Threat |
|
You don’t have a firewall in front of your server, so an attacker uses network flooding, such as TCP flood, UDP flood, ICMP flood, HTTP flood, or SSL flood to render your server unavailable. |
|
CAPEC |
CAPEC-482 – TCP flood CAPEC-486 – UDP flood CAPEC-487 – ICMP flood CAPEC-488 – HTTP flood CAPEC-489 – SSL flood |
ASVS |
N/A |
CWE |
N/A |
Mitigations |
|
... |