Understanding Common Cyberattacks: From DoS to Application-Level Threats part-2

Part 2 – Resource Exhaustion & Logic-Based Attacks

📘 Disclaimer: This article is intended solely for cybersecurity awareness and educational purposes. It does not endorse or promote any form of unauthorized access, attack simulation, or malicious activity.

📘 This is the second part of a two-part series. In Part 1, we explored foundational network-layer attacks such as SYN floods, UDP floods, and amplification techniques. If you haven’t read it yet, check it out for essential context.

In this follow-up, we move beyond the basics to examine stealthier, application-layer threats including botnet overloads, logic-triggered disruptions, and API misuse — all capable of crashing systems through non-traditional attack paths.

🧭

14. Botnet Attacks

Concept:

A botnet is a group of compromised devices (often IoT or servers) remotely controlled to perform coordinated malicious actions, such as large-scale traffic surges or brute-force attempts.

Real-World Example:

The Mirai botnet (2016) used IoT devices to disrupt DNS services, affecting platforms like Netflix and Twitter.

Everyday Analogy:

Like a criminal forcing thousands of people to call your phone at once — overwhelming you entirely.

Defense:

  • Secure IoT endpoints with patches and strong credentials
  • Monitor for abnormal outbound traffic
  • Partner with ISPs for traffic mitigation

15. Resource Exhaustion

Concept:

Exploits that consume excessive CPU, memory, or storage to render systems unresponsive.

Real-World Example:

Recursive file decompression used to drain processing power.

Everyday Analogy:

Like asking someone to solve endless puzzles until they collapse from exhaustion.

Defense:

  • Apply quotas for resource use per user/session
  • Monitor abnormal spikes
  • Auto-terminate runaway processes

16. Connection Flooding

Concept:

Opening large volumes of incomplete or idle connections to exhaust server limits.

Real-World Example:

Attackers saturate web servers with half-open TCP connections.

Everyday Analogy:

Like saving thousands of seats in a stadium with fake tickets, leaving no room for real fans.

Defense:

  • Limit simultaneous connections per IP
  • Use reverse proxies and load balancers
  • Enable aggressive connection timeouts

17. Zero-Day Exploits

Concept:

Attackers exploit vulnerabilities before developers are aware of them or before patches exist.

Real-World Example:

EternalBlue (used in WannaCry ransomware) targeted unpatched SMB flaws.

Everyday Analogy:

Like someone discovering a secret entrance to your house that you didn’t know existed.

Defense:

  • Prioritize rapid patching
  • Use behavioral-based intrusion prevention
  • Deploy virtual patching in WAFs or gateways

18. Malicious Logic Triggers (Formerly “Logic Bombs”)

Concept:

Hidden code that activates under specific conditions (e.g., dates, actions) to delete files or disrupt systems.

Real-World Example:

A time-triggered logic event in 2003 caused data loss at UBS PaineWebber.

Everyday Analogy:

Like a trap set to spring automatically when no one is watching.

Defense:

  • Conduct code audits and integrity checks
  • Monitor for scheduled/deletion-based anomalies
  • Limit access for internal developers

19. Recursive Process Overload (Formerly “Fork Bombs”)

Concept:

A script or process that spawns excessive child processes until system resources are depleted.

Real-World Example:

The :(){ :|:& };: shell command in Unix-based systems causes process overflows.

Everyday Analogy:

Like a person cloning themselves endlessly until the room is too crowded to function.

Defense:

  • Limit process creation using OS policies (e.g., ulimit)
  • Monitor for sudden process spikes
  • Educate admins to prevent accidental execution

20. Race Condition Exploits

Concept:

Attackers manipulate timing discrepancies in code execution to cause data corruption or elevate privileges.

Real-World Example:

File operation races exploited in Linux systems to gain root access or crash services.

Everyday Analogy:

Like two people racing for the same chair — and one ends up falling over.

Defense:

  • Implement synchronization and proper locking
  • Patch known race vulnerabilities
  • Use concurrency fuzz testing in QA

21. SQL-Based Service Disruption

Concept:

Attackers use SQL injection not for data theft, but to trigger costly or long-running queries that degrade performance.

Real-World Example:

Complex queries that cause full table scans can halt a database server.

Everyday Analogy:

Like handing a librarian a task so complex that no one else can be helped while they work on it.

Defense:

  • Use parameterized queries
  • Apply query timeouts and resource caps
  • Block malicious input via WAF

22. XML Entity Expansion Attacks (Formerly “XML Bombs”)

Concept:

Malicious XML inputs containing recursive entity references that expand exponentially, overloading memory and CPU.

Real-World Example:

The “Billion Laughs” attack has crashed vulnerable XML parsers in Java, .NET, and Python ecosystems.

Everyday Analogy:

Like opening a set of nesting boxes that multiply infinitely, filling your house.

Defense:

  • Disable entity expansion in XML parsers
  • Validate and sanitize incoming XML
  • Enforce size and depth limits on input

23. API Abuse & Service Flooding

Concept:

Attackers overwhelm APIs with excessive requests, causing service degradation or denial for legitimate users.

Real-World Example:

Login or payment APIs targeted with thousands of automated requests during peak hours.

Everyday Analogy:

Like fake customers swarming a help desk so real users can’t get assistance.

Defense:

  • Apply strict rate limiting and usage quotas
  • Use API gateways with authentication and throttling
  • Monitor usage patterns for anomalies

Conclusion (Part 2)

Modern attacks extend far beyond simple traffic flooding. Resource abuse, timing exploits, recursive logic triggers, and API misuse can cripple systems quietly and effectively. A strong defense requires:

  • Regular patching.
  • Input validation.
  • System-level process and resource limits.
  • Continuous monitoring and anomaly detection.

Leave a Comment