resource exhaustion attack
Množina: resource exhaustion attacks
Denial of service (DoS) by starving a system resource.Resource exhaustion (or resource starvation) is a form of DoS attack in which the attacker uses up a resource on the target system, with the result that no resources are available for legitimate users trying to access the system. Examples of types of resources that can be starved include central processing unit (CPU) cycles, memory (physical or virtual), network bandwidth, disk space, disk quota, file handles, processes, and threads. An example of a resource exhaustion attack is the Stream.c exploit, which drives up a systems CPU usage by sending streams of malformed Transmission Control Protocol (TCP) ACK packets having random source addresses and sequence numbers to a series of ports on the target machine. A similar exploit is Raped.c, which uses spoofed source addresses instead and has the same effect. These exploits affect a variety of platforms, both UNIX/Linux and Microsoft Windows operating systems, but can be prevented or mitigated by keeping systems up to date with patches issued by vendors.
Recovery Console · reflection attack · Regdmp · registration authority · remote administration tool · resource exhaustion attack · restrictive shell · reverse Telnet · reversible encryption · Rexec · logon rights