Detection of flooding attacks on spacecraft systems using valid but excessive commands. Threat actors may send a high volume of valid commands to spacecraft subsystems, communication buses, or the link layer, leading to resource exhaustion such as CPU usage spikes, memory depletion, and increased battery consumption. These attacks can create temporary denial of service conditions by overwhelming the spacecraft's processing capabilities, preventing it from performing other critical operations. This tactic relies on the legitimate processing of valid commands to degrade spacecraft performance and operational availability. Since these are valid commands, the spacecraft will use processing power to validate and process them taking away CPU cycles from other tasks on the spacecraft.
ID | Name | Description | |
EX-0001 | Replay | Replay attacks involve threat actors recording previously data streams and then resending them at a later time. This attack can be used to fingerprint systems, gain elevated privileges, or even cause a denial of service. | |
EX-0001.01 | Command Packets | Threat actors may interact with the victim spacecraft by replaying captured commands to the spacecraft. While not necessarily malicious in nature, replayed commands can be used to overload the target spacecraft and cause it's onboard systems to crash, perform a DoS attack, or monitor various responses by the spacecraft. If critical commands are captured and replayed, thruster fires, then the impact could impact the spacecraft's attitude control/orbit. |