CAPEC-590

IP Address Blocking
Baixa
Alta
Draft
2017-01-12
00h00 +00:00
2019-04-04
00h00 +00:00
Alerta para um CAPEC
Fique informado sobre quaisquer alterações para um CAPEC específico.
Gerenciar notificações

Descrições CAPEC

An adversary performing this type of attack drops packets destined for a target IP address. The aim is to prevent access to the service hosted at the target IP address.

Informações CAPEC

Pré-requisitos

This attack requires the ability to conduct deep packet inspection with an In-Path device that can drop the targeted traffic and/or connection.

Mitigações

Have a large pool of backup IPs built into the application and support proxy capability in the application.

Fraquezas Relacionadas

CWE-ID Nome da Fraqueza

CWE-300

Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Referências

REF-475

Censorship in the Wild: Analyzing Internet Filtering in Syria
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar.

Submissão

Nome Organização Data Data de lançamento
Seamus Tuohy 2017-01-12 +00:00

Modificações

Nome Organização Data Comentário
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Related_Vulnerabilities
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns, Related_Weaknesses