Common Attack Pattern Enumeration and Classification
A Community Resource for Identifying and Understanding Attacks
An adversary intercepts traffic and intentionally drops DNS requests based on content in the request. In this way, the adversary can deny the availability of specific services or content to the user even if the IP address is changed.
Full URL Based Filtering: Filtering based upon the requested URL.
URL String-based Filtering: Filtering based upon the use of particular strings included in the requested URL.
Hard Coded Alternate DNS server in applications
Avoid dependence on DNS
Include "hosts file"/IP address in the application
Ensure best practices with respect to communications channel protections.
Use a .onion domain with Tor support
More information is available — Please select a different filter.