Denial of Service

low

dos-attack

Attack aimed at making services unavailable to legitimate users

Denial of Service

MITRE ATT&CK techniques

IDNameTactic
T1498 Network Denial of Service Impact
T1499 Endpoint Denial of Service Impact

Common Weakness Enumeration

Mitigating controls

ctrl-dos-1
Implement rate limiting and throttling
ctrl-dos-2
Use DDoS protection services
ctrl-dos-3
Configure auto-scaling for critical services
ctrl-dos-4
Implement CDN for traffic distribution
ctrl-dos-5
Set up monitoring and alerting for traffic anomalies

References