Avatar feed
Responses: 3
SGT Cyber Defense Analyst
0
0
0
Very interesting thought on attacking networks... instead of launching attacks that focus on high bandwidth consumption, instead focus on high CPU consumption.

This train of thought could be spread to other things: Identify a content or traffic filter (snort) and keep hitting it with traffic that invokes computationally expensive rules in hopes that the device fails open.

One step further and the human factor comes into play. Invoke an attack that makes the IDS to fire off a bunch of emails to the human factor that are false positives, or appear to be false positives. The human factor will likely review the notices and realize they are false positives and begin to ignore. Slip through an attack that is likely to slip between the cracks and not be initially noticed.
(0)
Comment
(0)
Avatar small
LTC Owner
0
0
0
Thanks for the post, interesting attack method.
(0)
Comment
(0)
Avatar small
PO1 William "Chip" Nagel
0
0
0
(Join to see) Good Point, Many Thanks for Your Cyber Security Awareness.
(0)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close