Dark Mode

Settings

Capec-227 Detail

Sustained Client Engagement

Meta Software

Children: 469

Threats: T61 T64 T77 T265 T269 T289 T309

Description

An adversary attempts to deny legitimate users access to a resource by continually engaging a specific resource in an attempt to keep the resource tied up as long as possible. The adversary's primary goal is not to crash or flood the target, which would alert defenders; rather it is to repeatedly perform actions or abuse algorithmic flaws such that a given resource is tied up and not available to a legitimate user. By carefully crafting a requests that keep the resource engaged through what is seemingly benign requests, legitimate users are limited or completely denied access to the resource.

Extended Description

The degree to which the attack is successful depends upon the adversary's ability to sustain resource requests over time with a volume that exceeds the normal usage by legitimate users, as well as other mitigating circumstances such as the target's ability to shift load or acquire additional resources to deal with the depletion. This attack differs from a flooding attack as it is not entirely dependent upon large volumes of requests, and it differs from resource leak exposures which tend to exploit the surrounding environment needed for the resource to function. The key factor in a sustainment attack are the repeated requests that take longer to process than usual.
External ID Source Link Description
CAPEC-227 capec https://capec.mitre.org/data/definitions/227.html
CWE-400 cwe http://cwe.mitre.org/data/definitions/400.html
T1499 ATTACK https://attack.mitre.org/wiki/Technique/T1499 Endpoint Denial of Service
10 WASC http://projects.webappsec.org/Denial-of-Service Denial of Service

Not present

  1. This pattern of attack requires a temporal aspect to the servicing of a given request. Success can be achieved if the adversary can make requests that collectively take more time to complete than legitimate user requests within the same time frame.
  1. To successfully execute this pattern of attack, a script or program is often required that is capable of continually engaging the target and maintaining sustained usage of a specific resource. Depending on the configuration of the target, it may or may not be necessary to involve a network or cluster of objects all capable of making parallel requests.

Not present

Not present

Not present