This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Periodic Table of Vulnerabilities - Denial of Service (Application Based)"

From OWASP
Jump to: navigation, search
(Created page with "Return to Periodic Table Working View === Denial of Service (Application Based) === == Root Cau...")
 
Line 34: Line 34:
 
== References ==
 
== References ==
  
[https://www.owasp.org/index.php/Application_Denial_of_Service OWASP - Application Denial of Service]
+
[https://www.owasp.org/index.php/Application_Denial_of_Service OWASP - Application Denial of Service]
  
[http://cwe.mitre.org/data/definitions/400.html CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')]
+
[http://cwe.mitre.org/data/definitions/400.html CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')]
  
 
[http://capec.mitre.org/data/definitions/119.html CAPEC -119: Resource Depletion]
 
[http://capec.mitre.org/data/definitions/119.html CAPEC -119: Resource Depletion]

Revision as of 04:28, 21 July 2013

Return to Periodic Table Working View

Denial of Service (Application Based)

Root Cause Summary

The root cause of an Application Based denial of service is when an attacker uses/exhausts/depletes all of the resources (such as bandwidth, database connections, disk storage, CPU, memory, threads, or application specific resources) on a system preventing legitimate users from using the system. To prevent depletion of resources the application must restrict the size or amount of resources that are requested or used.

Browser / Standards Solution

None

Perimeter Solution

See Brute Force (Generic)Generic

Framework Solution

None

Custom Framework Solution

None

Custom Code Solution

Profile resource-dependent transactions and build transaction queues and alerting when queues reach thresholds. Enforce transaction-based rate limits.

Discussion / Controversy

Denial of service vulnerabilities has other names including “resource exhaustion” and “resource depletion” and there are other types of denial of service attacks different from application including network and connection based.

References

OWASP - Application Denial of Service

CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')

CAPEC -119: Resource Depletion