Log Repudiation Attack
Variants:
Direct
Also Known As:
Repudiation Attack
Vector Type:
Attack
Relevance:
Generic
Layer:
Application-Level
Platforms:
Any
Target Type:
Application
Affected Mechanisms:
Logging, Secure Design
Invented In:
01/01/1999
Added In:
21/12/2014
Vector Operation Method:
Attackers can manipulate values that affect the user identity in log entries, thus, avoid being held accountable for malicious actions and even incriminate other users for malicious actions.