Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based applications. Adversaries have been observed conducting network DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014)
A Network DoS will occur when the bandwidth capacity of the network connection to a system is exhausted due to the volume of malicious traffic directed at the resource or the network connections and network devices the resource relies on. For example, an adversary may send 10Gbps of traffic to a server that is hosted by a network with a 1Gbps connection to the internet. This traffic can be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS).
To perform Network DoS attacks several aspects apply to multiple methods, including IP address spoofing, and botnets.
Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices.
For DoS attacks targeting the hosting system directly, see Endpoint Denial of Service.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-3 | Access Enforcement | Protects | T1498 | Network Denial of Service | |
AC-4 | Information Flow Enforcement | Protects | T1498 | Network Denial of Service | |
CA-7 | Continuous Monitoring | Protects | T1498 | Network Denial of Service | |
CM-6 | Configuration Settings | Protects | T1498 | Network Denial of Service | |
CM-7 | Least Functionality | Protects | T1498 | Network Denial of Service | |
SC-7 | Boundary Protection | Protects | T1498 | Network Denial of Service | |
SI-10 | Information Input Validation | Protects | T1498 | Network Denial of Service | |
SI-15 | Information Output Filtering | Protects | T1498 | Network Denial of Service | |
action.hacking.variety.DoS | Denial of service | related-to | T1498 | Network Denial of Service | |
action.malware.variety.DoS | DoS attack | related-to | T1498 | Network Denial of Service | |
aws_config | AWS Config | technique_scores | T1498 | Network Denial of Service |
Comments
This control provides minimal coverage for this technique's sub-techniques as well as its procedures, resulting in an overall score of Minimal.
References
|
amazon_guardduty | Amazon GuardDuty | technique_scores | T1498 | Network Denial of Service |
Comments
The following finding types in GuardDuty flag events where adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users.
Backdoor:EC2/DenialOfService.UdpOnTcpPorts Backdoor:EC2/DenialOfService.UnusualProtocol Backdoor:EC2/DenialOfService.Udp Backdoor:EC2/DenialOfService.Tcp Backdoor:EC2/DenialOfService.Dns
References
|
aws_shield | AWS Shield | technique_scores | T1498 | Network Denial of Service | |
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | technique_scores | T1498 | Network Denial of Service |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict access to endpoints but will prove effective at mitigating only low-end DOS attacks resulting in a Minimal score.
References
|
aws_network_firewall | AWS Network Firewall | technique_scores | T1498 | Network Denial of Service |
Comments
AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to block the sources of smaller-scale network denial of service attacks. While AWS Network Firewall supports both all sub-techniques (2 of 2), this mapping is given a score of Minimal because often times it is necessary to block the traffic at an Internet Service Provider or Content Provider Network level.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1498.001 | Direct Network Flood | 14 |
T1498.002 | Reflection Amplification | 14 |