ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: IF026.002
  • Created: 02nd August 2025
  • Updated: 02nd August 2025
  • Contributor: The ITM Team

External Denial of Service

The subject initiates or facilitates a denial of service attack targeting public-facing organizational services, such as corporate websites, client portals, or externally accessible APIs, through external means. This may include direct volumetric attacks, abuse of known application logic weaknesses, or orchestration of resource exhaustion via cloud interfaces or third-party integrations. In some cases, the subject may coordinate with external actors to mask attribution, prolong disruption, or cause reputational damage.

Detection

ID Name Description
DT052Audit Logging

Audit Logs are records generated by systems and applications to document activities and changes within an environment. They provide an account of events, including user actions, system modifications, and access patterns.

DT039Web Proxy Logs

Depending on the solution used, web proxies can provide a wealth of information about web-based activity. This can include the IP address of the system making the web request, the URL requested, the response code, and timestamps.

An organization must perform SSL/TLS interception to receive the most complete information about these connections.