CAPEC 488 HTTP Flood

Draft Standard Unknown Risk

Description

An adversary may execute a flooding attack using the HTTP protocol with the intent to deny legitimate users access to a service by consuming resources at the application layer such as web services and their infrastructure. These attacks use legitimate session-based HTTP GET requests designed to consume large amounts of a server's resources. Since these are legitimate sessions this attack is very difficult to detect.

Mitigations

4

Consequences

Relationships

Related ATT&CK Techniques

1