Explain a SYN Flood attack


Normally user establishes a connection on the Internet via a three-way handshake. The connecting server sends an initiation code called a SYN (SYNchronize) packet to the receiving server. The receiving server then acknowledges the request by returning a SYNchronize-AC Knowledge (SYN-AC K) packet. Finally, the initiating host machine responds with an ACK packet code. The SYN flood attack is accomplished by not sending the final acknowledgment to the server's SYNACK response, which causes the server to keep signaling for acknowledgement until the server times out.

The individual or organization perpetrating the SYN flood attack transmits hundreds of SYN packets to the targeted receiver, but never responds with an ACK to complete the connection. As a result, the ports of the receiver's server are clogged with incomplete communication requests that prevent legitimate transactions from being received and processed. Organizations under attack may, thus, be prevented from receiving Internet messages for days at a time.

Business

You might also like to view...

New Zealand was the first country to implement a system of

A. disinflation. B. deflation. C. inflation targeting. D. expectations traps.

Business

As a result of conflict that can come from diversity within a group or team, what stage of team development could that team revert to?

a. forming b. storming c. norming d. performing

Business

The approach to decision making that identifies candidates with the highest scores based on quantitative predictors is the

A. personal judgment approach. B. quantitative approach. C. objective approach. D. statistical approach.

Business

Jobs are ranked according to their processing times, and the job with the longest processing time will be processed first and completed in the ______.

a. shortest processing time b. earliest due date c. longest processing time d. critical ratio (CR)

Business