Dark Mode
Capec-482 Detail
TCP Flood
Standard Communications Software
Parents: 125
Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404
An adversary may execute a flooding attack using the TCP protocol with the intent to deny legitimate users access to a service. These attacks exploit the weakness within the TCP protocol where there is some state information for the connection the server needs to maintain. This often involves the use of TCP SYN messages.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-482 | capec | https://capec.mitre.org/data/definitions/482.html | |
| CWE-770 | cwe | http://cwe.mitre.org/data/definitions/770.html | |
| T1498.001 | ATTACK | https://attack.mitre.org/wiki/Technique/T1498/001 | Network Denial of Service: Direct Network Flood |
| T1499.001 | ATTACK | https://attack.mitre.org/wiki/Technique/T1499/001 | Endpoint Denial of Service: OS Exhaustion Flood |
| T1499.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1499/002 | Endpoint Denial of Service: Service Exhaustion Flood |
Not present
- This type of an attack requires the ability to generate a large amount of TCP traffic to send to the target port of a functioning server.
Not present
Not present
Not present
Not present