D
D
DVoropaev2017-08-22 09:54:02
Computer networks
DVoropaev, 2017-08-22 09:54:02

Can arp-spoofing be considered a dos attack in this case?

Let's say there is a server (website, database - it doesn't matter), we are with him on the local network and send him left arp responses. Its arp table is filled with non-existent mac addresses, and because of this, it loses packets that it sends to the router.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
U
Uncle Seryozha, 2017-08-22
@Protos

Well, if you refer to the definition from GOSTs, then yes, because. there are no specific clarifications intentional / unintentional. You can click on the list of FSTEC threats and vulnerabilities.

V
Vladimir Dubrovin, 2017-08-22
@z3apa3a

Yes, you can. In Russian legislation there is a concept of "blocking" computer information. Gene. The procurator gives the following definition:
blocking of information is the result of influencing computer information or equipment, the consequence of which is the impossibility for some time or permanently to carry out the required operations on computer information in full or in the required mode, that is, the commission of actions leading to restriction or closing of access to computer equipment and resources located on it, purposefully hindering the access of legitimate users to computer information, not related to its destruction;

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question