{"id":312,"date":"2025-06-29T02:46:15","date_gmt":"2025-06-29T02:46:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dberr012\/?p=312"},"modified":"2025-06-29T02:46:15","modified_gmt":"2025-06-29T02:46:15","slug":"exploring-attacks-on-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/06\/29\/exploring-attacks-on-availability\/","title":{"rendered":"Exploring Attacks on Availability"},"content":{"rendered":"\n<p>An attack on availability means to target and disrupt access to certain data, services, or<br>systems that should be reachable for users. These kinds of attacks go after the third type in the<br>CIA triad of confidentiality, integrity, and availability. The most widely known type of attack in<br>this form is DDoS (Distributed Denial of Service). In these kinds of attacks, the perpetrator<br>would use thousands of devices to attack the victim\u2019s network so that customers would have<br>connections refused or timed out. A recent use of this technique was disclosed in October 2023.<br>In what was known as a HTTP\/2 Rapid Reset, hackers exploiting a weakness in the protocol\u2019s<br>stream cancellation feature were able to use bots to cancel thousands of requests. Due to each<br>cancellation forcing the server to allocate resources, attackers are able to generate millions of<br>requests that were later reported by Google, Amazon AWS, and Cloudfare. With these attacks,<br>they result in a large amount of revenue lost for the organizations due to downtime, violations,<br>damage to reputation, and operation costs. Users can also experience outages, deteriorated<br>performance, and potential safety or economic issues as a result. Attackers can also use these<br>attacks to ask for ransom or use it as a smokescreen for other attacks. It is with these kinds of<br>attacks that cause the most damage to individuals, companies, and organizations. With<br>availability attacks, they target a user\u2019s data that is most useful and accessible to them. In this<br>example, it shows how many user\u2019s accessible data was taken and used against them and caused<br>damage to many companies. It is in knowing about these attacks that you know how to secure<br>your data and safety for the next.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An attack on availability means to target and disrupt access to certain data, services, orsystems that should be reachable for users. These kinds of attacks go after the third type in theCIA triad of confidentiality, integrity, and availability. The most widely known type of attack inthis form is DDoS (Distributed Denial of Service). In these&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/06\/29\/exploring-attacks-on-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":30971,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/users\/30971"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/312\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}