From the course: Learning Threat Modeling for Security Professionals

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Denial of service

Denial of service

From the course: Learning Threat Modeling for Security Professionals

Start my 1-month free trial

Denial of service

- The D in STRIDE stand for denial-of-service. There are denial-of-service or DoS attacks against processors, networks, and storage. In the world of IoT, there's denial-of-service against batteries and in the ElastiCLOUD world against your wallet. The easiest denial-of-service attacks are simply brute-force With a lot of requests to see a given ad, the network fills up. Either because of the connections inbound or more likely data outbound. If you have requests for different ads, then your disk might be the bottleneck. If red 30 sticky eye algorithm for deciding who sees which ad is complex, then you might overload your server. I'm making the assumption here that the attackers don't know or care about red 30. They make simple requests and they do the damage that they do. Simple brute-force can be very effective in denial-of-service but not all attacks are brainless not even all denial-of-service attacks. There are denial-of-service attacks that are symmetric, where attacker and…

Contents