• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Recursive GET and Random Recursive GET Attacks: What’s the Difference?

April 26, 2018 By TheNewsTeam

A Recursive GET attack is a variant of the Excessive Verb attack, or HTTP Flood, in which attackers send huge amounts of legitimate HTTP requests to a server to overwhelm it so that it will deny service to legitimate users. These can be in the form of “GET” or “POST”. GET requests are used to retrieve static content.

Excessive verb attacks allow the attacker to aim and maintain high CPU processing loads on the victim server with disproportionately low attack packet rates. These are usually GET requests aimed at receiving large website sources. As each bot can generate a massive number of legitimate requests (over 10 per second), these kinds of attacks do not require a large number of bots to perform.

In the case of a recursive GET attack (also known as a recursive HTTP GET Flood), an attacker will identify and request multiple pages of a website and/or images, and generate HTTP GET requests for each object. This makes it seem as if a legitimate user is scrolling through these pages or images. This attack vector can be highly challenging to detect as the recursive requests of website objects look valid. It can be combined with any of the VERB attack methods, such as HEAD, PUT, OPTIONS or any other HTTPS method that aims to cause DDoS.

A random recursive GET attack is a modified version of a recursive GET. This kind of attack is mainly used on news sites or forums sites on which web pages are numerically indexed, typically in a sequential way. The attacker will insert a random number within a valid range of page reference numbers, which makes each subsequent GET statement different. As each query is different from the previous one, it also is a good emulation of legitimate user behaviour and makes detection more difficult.

One way to protect against excessive verb attacks is to set limits to the transmission band per one IP; however, this can actually help the attacker’s agenda by decreasing the website speed or making it partially unavailable to legitimate users. The other option is to install hardware analysis and cleaning tools, and/or to work with a DDoS protection service to guard against such attacks.

Filed Under: HTTP Attack, Random Recursive GET attack, Recursive GET attack Tagged With: DDoS mitigation, Excessive Verb Flood, forum sites, GET, HTTP Flood, news sites, POST, Random Recursive GET attack, Recursive GET attack

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.