Capec的新手?Start Here
Home>CAPEC List> CAPEC-488: HTTP Flood (Version 3.9)

CAPEC-488: HTTP Flood

Attack Pattern ID: 488
Abstraction:Standard
View customized information:
+Description
对手可以使用HTTP协议执行洪水攻击,以拒绝合法用户通过在应用程序层(例如Web服务及其基础架构)上消费资源来访问服务。这些攻击使用基于合法会话的HTTP获取请求,旨在消耗大量服务器的资源。由于这些是合法的会议,因此很难检测到这种攻击。
+Relationships
Section Help该表显示了与此攻击模式相关的其他攻击模式和高级类别。这些关系定义为childof和parentof,并深入了解可能存在于较高和较低抽象水平的类似项目。此外,定义了诸如Canfollow,Peerof和Canalsobe之类的关系,以显示用户可能想要探索的类似攻击模式。
Nature Type ID Name
ChildOf Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. 125 Flooding
Section HelpThis table shows the views that this attack pattern belongs to and top level categories within that view.
+Prerequisites
This type of an attack requires the ability to generate a large amount of HTTP traffic to send to a target server.
+缓解
Design: Use a Web Application Firewall (WAF) to help filter out malicious traffic. This can be setup with rules to block IP addresses found in IP reputation databases, which contains lists of known bad IP addresses. Analysts should also monitor when the traffic flow becomes abnormally large, and be able to add on-the-fly rules to block malicious traffic. Special care should be taken to ensure low false positive rates in block rules and functionality should be implemented to allow a legitimate user to resume sending traffic if they have been blocked.
Hire a third party provider to implement a Web Application Firewall (WAF) for your application. Third party providers have dedicated resources and expertise that could allow them to update rules and prevent HTTP Floods very quickly.
设计:使用负载平衡器(例如NGINX)通过分散一组服务器之间的流量来防止小规模HTTP洪水。
Implementation: Make a requesting machine solve some kind of challenge before allowing them to send an HTTP request. This could be a captcha or something similar that works to deter bots.
+Taxonomy Mappings
Section HelpCAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.
Relevant to the ATT&CK taxonomy mapping (also seeparent)
Entry ID Entry Name
1499.002 Endpoint Denial of Service:Service Exhaustion Flood
+参考
[REF-751] "HTTP Flood Attack". <https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/>.URL validated: 2023-01-20
+Content History
Submissions
Submission Date Submitter Organization
2014-06-23
(版本2.6)
CAPEC Content Team manbetx客户端首页
Modifications
Modification Date Modifier Organization
2019-04-04
(Version 3.1)
CAPEC Content Team manbetx客户端首页
Updated Related_Weaknesses
2020-07-30
(Version 3.3)
CAPEC Content Team manbetx客户端首页
Updated Taxonomy_Mappings
2021-06-24
(Version 3.5)
CAPEC Content Team manbetx客户端首页
Updated Taxonomy_Mappings
2022-09-29
(Version 3.8)
CAPEC Content Team manbetx客户端首页
Updated Taxonomy_Mappings
2023-01-24
(Version 3.9)
CAPEC Content Team manbetx客户端首页
Updated Mitigations, References
More information is available — Please select a different filter.
页面最后更新或审查:October 21, 2021