Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Understanding and Classifying Permanent Denial of Service Attacks

Version 1 : Received: 8 February 2024 / Approved: 9 February 2024 / Online: 9 February 2024 (13:12:14 CET)

How to cite: Abaimov, S. Understanding and Classifying Permanent Denial of Service Attacks. Preprints 2024, 2024020561. https://doi.org/10.20944/preprints202402.0561.v1 Abaimov, S. Understanding and Classifying Permanent Denial of Service Attacks. Preprints 2024, 2024020561. https://doi.org/10.20944/preprints202402.0561.v1

Abstract

In the evolving landscape of cybersecurity threats, the Permanent Denial of Service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression. Unlike the more well-known Denial of Service (DoS) attacks, which disrupt services temporarily, PDoS attacks aim to inflict irreversible damage to systems, often resulting in significant system overhauls and requiring hardware replacement. To enable the development of effective security measures, but also to address the knowledge gaps, this paper offers an in-depth exploration of PDoS attacks, emphasizing their distinguishing characteristics, underlying mechanisms, and potential further development. Through a comprehensive case study, the research highlights diverse tactics and strategies employed by attackers, from targeting IoT devices to manipulating boot processes and exploiting firmware vulnerabilities. A novel classification of PDoS attack vectors is proposed, that also explains the ways in which the systems can be compromised. The findings confirm the pressing need for adaptive and robust defense mechanisms to mitigate the threats posed by PDoS attacks in our interconnected digital world.

Keywords

Cyber attack; Denial of Service; Exploit

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.