RUDY Attack and it's prevention

RUDY Attack:

It is the type of slow rate attacks. It also known as slow and low attack. It attempts to open a relatively few connections to the target server or website over a period of time, and leaves the connection as long as possible.

How it works:
It identifies the embedded form in the target site. After identification it sends the HTTP post request with abnormal long ‘content-type’ header field and then starts injecting the form with information, size of one byte packet at one time. This packet is not only sent in junks but at a very slow rate. So , a very long content-length field prevents the server from closing the connection. Ultimately the attacker exhausts the server connection table.

Prevention Mechanisms:
  • Server resource monitoring like memory, CPU usage, connection tables, application threads, long and open application connection or stuck application processes.
  • Behavior analysis compares traffic and user behavior. Or if filling the form takes so much time like hours or minutes instead of seconds.
  • You can also improve the server availability but attackers can also take advantage from the DDOS like botnet.
  • Reverse Proxy is another solution
  • Set the strict time out connection but affects the users which have slow internet connections.
  • Use CDN to prevent the attack from the origin server.

Comments

Popular posts from this blog

Analyzing Spear Phishing Email

Cyber Threat Intel

Practical Malware Analysis (Introductory)