The degree to which the attack is successful depends upon the adversary's ability to sustain resource requests over time with a volume that exceeds the normal usage by legitimate users, as well as other mitigating circumstances such as the target's ability to shift load or acquire additional resources to deal with the depletion. This attack differs from a flooding attack as it is not entirely dependent upon large volumes of requests, and it differs from resource leak exposures which tend to exploit the surrounding environment needed for the resource to function. The key factor in a sustainment attack are the repeated requests that take longer to process than usual.
Scope | Likelihood | Impact | Note |
---|
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1499 | Endpoint Denial of Service |
WASC | 10 | Denial of Service |