An algorithmic complexity attack (ACA) is a form of attack in which an attacker sends a pattern of requests to a computer system that triggers the worst-case performance of the algorithms it uses.
In turn, this may exhaust the resources the system uses.
[1] Examples of such attacks include ReDOS,[2] zip bombs and exponential entity expansion attacks.
This computer security article is a stub.
You can help Wikipedia by expanding it.