CAPEC-590

IP Address Blocking
Niski
Wysoki
Draft
2017-01-12
00h00 +00:00
2019-04-04
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

An adversary performing this type of attack drops packets destined for a target IP address. The aim is to prevent access to the service hosted at the target IP address.

Informacje CAPEC

Wymagania wstępne

This attack requires the ability to conduct deep packet inspection with an In-Path device that can drop the targeted traffic and/or connection.

Łagodzenie

Have a large pool of backup IPs built into the application and support proxy capability in the application.

Powiązane słabości

CWE-ID Nazwa słabości

CWE-300

Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Odniesienia

REF-475

Censorship in the Wild: Analyzing Internet Filtering in Syria
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar.

Zgłoszenie

Nazwa Organizacja Data Data wydania
Seamus Tuohy 2017-01-12 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Related_Vulnerabilities
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns, Related_Weaknesses