SYN Flood is also known as Sync Flood or Sync Storm. It is a DOS (Denial-Of-Service) attack.

image.png

The attacker quickly initiates a TCP connection, but does not complete it. As a result, the server will spend resources waiting for the connection to complete, and eventually when the attacker occupies enough resources, the server will not be able to provide responses for normal requests.

The normal steps to establish a connection are:

image.png

  1. Client sends SYN message
  2. The server returns a SYN-ACK message
  3. The client sends an ACK message and the connection is established.

This is also called the TCP three-way handshake.

An attacker can keep the server waiting by not returning an ACK message. An attacker can also include a fake IP address in the SYN message, causing the server's SYN-ACK message to be sent elsewhere.

countermeasures

  • filter
  • Increase backlog (waiting queue)
  • Decrease SYN-RECEIVED timer
  • Recycle the oldest half-open TCP connection
  • SYN cache
  • SYN cookies
  • mixed means
  • Firewalls and proxies

Ljzn
399 声望102 粉丝

网络安全;函数式编程;数字货币;人工智能


引用和评论

0 条评论