HTTP Flood
This article needs additional citations for verification. (June 2017) (Learn how and when to remove this template message) |
HTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses. Instead of using malformed packets, spoofing and reflection techniques, HTTP floods require less bandwidth to attack the targeted sites or servers.
Attack description
In an HTTP flood, the HTTP clients such as web browser interact with an application or server to send HTTP requests. The request can be either “GET” or “POST”. The aim of the attack is when to compel the server to allocate as many resources as possible to serving the attack, thus denying legitimate users access to the server's resources.
GET flood
The GET request is used to retrieve static content like images. Typically this induces relatively low load on the server per request.
POST flood
An HTTP POST flood (or simply POST flood) is a denial of service attack that uses POST requests, which are part of the Hypertext Transfer Protocol (HTTP).[1] As of late 2013, POST floods were increasingly being launched from mobile devices.[2]
POST requests are more likely to require the server to perform some kind of processing, such as looking up items in a database. Therefore, HTTP POST flood attacks typically impose higher load on the server per request.[citation needed]
Methods of mitigation
As HTTP flood attacks use standard URL requests hence it is quite challenging to differentiate from valid traffic. One of the most effective mitigation methods is the combination of traffic profiling methods that mainly includes identification of IP reputation, tracking abnormal actions and employing progressive sanctuary challenges.[3]
References
- ↑ "DDoS Quick Guide". National Cybersecurity and Communications Integration Center, Department of Homeland Security. 29 January 2014. https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf.
- ↑ Player, Chris (2014-01-18). "Mobile devices become launchpads for DDoS attacks". PCWorld. http://www.pcworld.com/article/2089510/mobile-devices-become-launchpads-for-ddos-attacks.html. Retrieved 2017-01-24.
- ↑ Cid, Daniel (February 6, 2014). "Layer 7 DDOS – Blocking HTTP Flood Attacks". https://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html.
Original source: https://en.wikipedia.org/wiki/HTTP Flood.
Read more |