This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
Line 1: | Line 1: | ||
− | {{ | + | {{template:CandidateForDeletion}} |
− | |||
__TOC__ | __TOC__ | ||
Line 9: | Line 8: | ||
− | |||
− | |||
==Description== | ==Description== | ||
Line 53: | Line 50: | ||
__NOTOC__ | __NOTOC__ | ||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 14:47, 31 January 2009
Last revision (mm/dd/yy): 01/31/2009
Description
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Risk Factors
TBD
Examples
TBD
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD