Connection Flooding

low

connection-flooding

Attacker overwhelms the connection between services to disrupt communication

Denial of Service

MITRE ATT&CK techniques

IDNameTactic
T1498 Network Denial of Service Impact

Common Weakness Enumeration

Mitigating controls

ctrl-connflood-1
Implement rate limiting between services
ctrl-connflood-2
Use connection pooling and timeouts
ctrl-connflood-3
Deploy load balancers with DDoS protection
ctrl-connflood-4
Implement circuit breakers for resilience

References