Denial of Protection

Popularity:

9

Simplicity:

10

Impact:

10

Risk Rating:

10

Resiliency is not designed to reduce a target's attack surface, but it will assure that when other controls fail, they fail in a way so that assets are immediately separated from the threat. Attacking this control is a means of causing a denial of service to legitimate users.

The truth about resiliency controls are that for most implementations they are at odds with continuity controls. Implementing these controls on a network-sized scale without shutting down the entire network when an attack is perpetrated is incredibly difficult. However, many network intrusion prevention systems and some firewalls use resiliency. Furthermore, it is often implemented in a poor or ad hoc manner where anyone can trigger the controls and affect everyone. A great example is when a bad interaction triggers a resiliency control to add an attacker's IP address to a list of IPs to ignore and deny service to. The attacker then spoofs the IP address of the gateway router or other internal servers so they deny traffic within their own network and effectively box themselves out.

The trick to making the resiliency code eat its own just desserts has less effect these days due to abuse. Most of these systems are configured to not deny certain IP ranges, which will effectively protect them from this attack. It is still possible, however, to send attacks using spoofed IPs to deny access to partners, customers, and others who depend on reaching those services.

Was this article helpful?

0 0
Making Chocolate 101

Making Chocolate 101

If you love chocolate then you can’t miss this opportunity to... Discover How to Make Homemade Chocolate! Do you love gourmet chocolate? Most people do! Fine chocolates are one of life’s greatest pleasures. Kings and princes have for centuries coveted chocolate. Did you know that chocolate used to be one of the expensive items in the world, almost as precious as gold? It’s true!

Get My Free Ebook


Post a comment