Statements (74)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:terrorism
|
gptkbp:affects |
gptkb:business
|
gptkbp:can_be_a_tactic_in |
gptkb:protests
|
gptkbp:can_be_executed_against |
gptkb:financial_institutions
government websites |
gptkbp:can_be_reported_to |
gptkb:law_enforcement
|
gptkbp:can_be_used_as_a_distraction_for |
other cyber attacks
|
gptkbp:can_detect |
traffic analysis
anomaly detection systems |
gptkbp:can_lead_to |
financial loss
|
gptkbp:can_result_in |
social engineering attacks
insufficient resources network misconfigurations lack of security measures system overload inadequate bandwidth poor network configuration poorly configured servers vulnerable applications |
gptkbp:cause |
service disruption
|
gptkbp:challenges |
gptkb:cloud_services
|
gptkbp:has_a_focus_on |
cybersecurity legislation
|
https://www.w3.org/2000/01/rdf-schema#label |
Denial of Service (Do S)
|
gptkbp:is_a_form_of |
attack vector
service attack |
gptkbp:is_a_subject_of |
research in computer science
|
gptkbp:is_analyzed_in |
cybersecurity research papers
forensic tools |
gptkbp:is_associated_with |
extortion attacks
|
gptkbp:is_different_from |
gptkb:Distributed_Denial_of_Service_(DDo_S)
|
gptkbp:is_illegal_in_many_jurisdictions |
gptkb:true
|
gptkbp:is_often_a_target_of |
security audits
|
gptkbp:is_often_associated_with |
hacktivism
|
gptkbp:is_often_discussed_in |
cybersecurity forums
IT security conferences cybersecurity blogs |
gptkbp:is_often_executed_using |
botnets
|
gptkbp:is_often_involved_in |
cybersecurity training
|
gptkbp:is_often_used_in |
cyber warfare
|
gptkbp:is_part_of |
gptkb:Cybersecurity
disaster recovery plans incident response plans |
gptkbp:is_threatened_by |
online services
|
gptkbp:issues |
social media platforms
telecommunications companies e-commerce websites internet security online gaming platforms |
gptkbp:performed_in |
criminal organizations
individual hackers |
gptkbp:prevention |
load balancing
rate limiting intrusion detection systems content delivery networks (CDNs) firewalls network redundancy |
gptkbp:reported_by |
security incidents
|
gptkbp:scientific_classification |
protocol attack
application layer attack volumetric attack |
gptkbp:targets |
web servers
|
gptkbp:type_of |
gptkb:terrorism
malicious activity malware attack |
gptkbp:was_a_precursor_to |
data breaches
|
gptkbp:was_executed_by |
exploitation of vulnerabilities
HTTP flood UDP flood flooding techniques TCP SYN flood |
gptkbp:bfsParent |
gptkb:CVE-2021-3449
gptkb:CVE-2021-45046 gptkb:CVE-2021-45105 |
gptkbp:bfsLayer |
6
|