Denial of Service

Description

Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementComputerActive vulnerabilities detected by Tenable Vulnerability Management plugins
Tenable OT SecurityOT DeviceActive vulnerabilities detected by detected by Tenable OT Security plugins

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Inhibit Response Function

Sub-Technique: Denial of Service

Platform: None

Tenable Release Date: 2024 Q2