Mitigation Use Case: “S-1: Throttle All Requests”

Precondition

1. Anonymous request is made to the system

2. Validated request is made to the system

Postcondition

1. DoS Attack requests have been throttled

Paths (steps)

1. Request is determined if request is anonymous or valid

2. Authentic requests are allowed to pass undeterred

3. A small number of anonymous requests are allowed to pass undeterred

Abstraction Level: High