CAPEC-590

IP Address Blocking
Niedrig
Hoch
Draft
2017-01-12
00h00 +00:00
2019-04-04
00h00 +00:00
Benachrichtigung für ein CAPEC
Bleiben Sie über alle Änderungen zu einem bestimmten CAPEC informiert.
Benachrichtigungen verwalten

CAPEC-Beschreibungen

An adversary performing this type of attack drops packets destined for a target IP address. The aim is to prevent access to the service hosted at the target IP address.

CAPEC-Informationen

Voraussetzungen

This attack requires the ability to conduct deep packet inspection with an In-Path device that can drop the targeted traffic and/or connection.

Gegenmaßnahmen

Have a large pool of backup IPs built into the application and support proxy capability in the application.

Verwandte Schwachstellen

CWE-ID Name der Schwachstelle

CWE-300

Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Referenzen

REF-475

Censorship in the Wild: Analyzing Internet Filtering in Syria
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar.

Einreichung

Name Organisation Datum Veröffentlichungsdatum
Seamus Tuohy 2017-01-12 +00:00

Änderungen

Name Organisation Datum Kommentar
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Related_Vulnerabilities
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns, Related_Weaknesses