S 4.405 Preventing resources (DoS) of web applications from being blocked

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Developer, Administrator

Web applications often provide the users resource-intensive functions triggering complex database queries, for instance. If these CPU-intensive operations are called up often deliberately or if the web application is flooded with requests, this can restrict the operation of the web application or even make it unavailable. This procedure is referred to as denial-of-service (DoS) attack.

In most cases, DoS attacks as well as brute-force and enumeration attacks are based on automation (see safeguard S 4.396 Protection against unauthorised automated use of web applications). In order to prevent these DoS attacks, similar protection mechanisms should thus be implemented. This includes, for example, the following safeguards:

In addition, the following examples provide information on specific safeguards to make denial-of-service attacks at the web application level more difficult:

In addition, the following examples provide information on specific safeguards to make denial-of-service attacks at the web application level more difficult:

Review questions: