20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SYN Flooding Attack<br />

It is clear that if a malacioous user simply sends a lot of SYN sgements to a target<br />

machine (with faked source IP addresses) ⇒ this machine will spend a lot of<br />

resources to set up TCP connections which subsequently never occur.<br />

As the number of TCP control blocks and other resources are finite<br />

• legitimate connection requests can’t be answered<br />

• the target machine might even crash<br />

The result is to deny service, this is one of many Denial of Services (DoS) Attacks<br />

Maguire TCP header continued 5: 10 of 77<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!