This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
| Line 1: | Line 1: | ||
| − | {{ | + | {{template:CandidateForDeletion}} |
| − | |||
__TOC__ | __TOC__ | ||
| Line 9: | Line 8: | ||
| − | |||
| − | |||
==Description== | ==Description== | ||
| Line 53: | Line 50: | ||
__NOTOC__ | __NOTOC__ | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
Revision as of 14:47, 31 January 2009
Last revision (mm/dd/yy): 01/31/2009
Description
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Risk Factors
TBD
Examples
TBD
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD