Low and slow

Published - 1 min to read
Today I learned a little about web security, and one of the things I read about which I thought were awesome, were low and slow attacks. These are almost the opposite of conventional DDoS attacks, but instead of sending as much data as possible to take up the entirety of the recipients bandwidth, they send a tiny amount of data - only bytes at a time - very slowly. Apache webservers are particularly vulnerable because they have a limited number of connections, so certain scripts, such as the slow loris attack or R U Dead Yet? (RUDY - named after the excellent Children of Bodom album) simply setup 200 sockets and then begin occupying the time of the server. They send over a tiny amount of data very slowly - this ensures the server doesn't close the connection. Because the attacker is only using a small amount of bandwidth, that computer will function entirely normally. Oh, and these scripts are small (most less than 100 lines of code), elegant, and very difficult to detect. Hilarious.