RUDY Attack and it's prevention
RUDY Attack:
It is the type of slow rate attacks. It also known as slow and low attack. It attempts to open a relatively few connections to the target server or website over a period of time, and leaves the connection as long as possible.
How it works:
It identifies the embedded form in the target site. After identification it sends the HTTP post request with abnormal long ‘content-type’ header field and then starts injecting the form with information, size of one byte packet at one time. This packet is not only sent in junks but at a very slow rate. So , a very long content-length field prevents the server from closing the connection. Ultimately the attacker exhausts the server connection table.
Prevention Mechanisms:
- Server resource monitoring like memory, CPU usage, connection tables, application threads, long and open application connection or stuck application processes.
- Behavior analysis compares traffic and user behavior. Or if filling the form takes so much time like hours or minutes instead of seconds.
- You can also improve the server availability but attackers can also take advantage from the DDOS like botnet.
- Reverse Proxy is another solution
- Set the strict time out connection but affects the users which have slow internet connections.
- Use CDN to prevent the attack from the origin server.
Comments
Post a Comment