Detection of erroneous input flooding attacks targeting spacecraft communication channels by injecting irrelevant noise, data, or signals. This flooding method disrupts the processing of legitimate messages by introducing a high volume of non-system-relevant or malformed packets. Even though these inputs are irrelevant, the spacecraft may still expend computing resources attempting to process or discard them, leading to resource exhaustion and potential degradation of communication integrity and availability. Such attacks aim to cause denial of service conditions by saturating the spacecraft's computational resources and communication bandwidth with useless data.
ID | Name | Description | |
EX-0013 | Flooding | Threat actors use flooding attacks to disrupt communications by injecting unexpected noise or messages into a transmission channel. There are several types of attacks that are consistent with this method of exploitation, and they can produce various outcomes. Although, the most prominent of the impacts are denial of service or data corruption. Several elements of the spacecraft may be targeted by jamming and flooding attacks, and depending on the time of the attack, it can have devastating results to the availability of the system. | |
EX-0013.02 | Erroneous Input | Threat actors inject noise/data/signals into the target channel so that legitimate messages cannot be correctly processed due to impacts to integrity or availability. Additionally, while this technique does not utilize system-relevant signals/commands/information, the target spacecraft may still consume valuable computing resources to process and discard the signal. |