際際滷

際際滷Share a Scribd company logo
How to Mitigate TCP Syn Flood Attacks
From a user perspective, signing onto the internet is so straightforward that most people
dont even question it. When your computer or mobile device connects to the internet, the
process of logging onto the network and obtaining your unique internet address for sending
and receiving data is all thanks to something called the internet protocol suite.
Of this set of protocols, among the most critical is the transmission Control Protocol (TCP),
the internet standard when it comes to the successful exchanging of data packets over a
network. Whether its email applications, peer-to-peer apps, FTP, or web servers and
websites, the TCP protocol is what makes everything possible when it comes to online
communication.
To work, a TCP connection needs to make what is referred to as a three-way handshake,
involving both the client and the server. To begin the handshake, the client sends the server
an SYN packet connection request. The server then answers with an SYN/ACK packet, which
acknowledges the connection request has been made. As the last step, the client  having
received the SYN/ACK packet  responds with an ACK packet.
This process is technically referred to as the SYN, SYN-ACK, ACK sequence. The three-way
handshake might sound like a simple greeting (a bit like saying hello to a buddy, getting a
hey! back, and then responding with another message to confirm that you were initiating a
conversation), but its an important interaction  not least because it adds an element of
security that protects against spoofing.
TCP has its weaknesses
Source: amazonaws.com
But TCP isnt infallible. Its vulnerable to several types of DDoS (distributed denial of service)
attacks. The most common of these is an SYN flood. In a DDoS attack, the attacker targets
the victim with large quantities of junk traffic with the aim of overwhelming their system and
causing it to become inaccessible to legitimate traffic.
An SYN flood takes place during the three-way handshake process described above. The
difference is that, unlike a normal SYN, SYN-ACK, ACK sequence, in an SYN flood attack
these hello requests are sent by the attacker to every port on a victims machine at a rate
that is faster than its able to process.
Overloaded by trying to process too many fake SYN requests at once, the machine stops
being able to respond to legitimate TCP requests. This type of attack is also known as a TCP
State-Exhaustion Attack. While the premise of the attack might sound simple, an SYN flood
can bring even the highest capacity devices, capable of millions of connections, to a
standstill.
While an SYN flood counts as a DDoS attack, it is different in one keyway. A regular DDoS
attack aims to use up a targets memory. An SYN flood instead works by overloading the
open connections that are connected to a port.
Every time an SYN packet connection request is made, the TCP goes into a listen state.
Exploiting this behavior, the SYN flood causes the host to enter this state, responding to fake
half- connections, until it has no resources left. SYN floods are sometimes referred to as
half-open attacks for this reason.
Defending against SYN flood vulnerabilities
Source: cloudflare.com
The vulnerability that could lead to a TCP SYN flood was first discovered as far back as 1994
by security researchers Bill Cheswick and Steve Bellovin. At the time, there was no existing
countermeasure that could protect against such an attack. Fortunately, things have advanced
in the years since. Several methods of mitigating SYN floods now exist.
One such example is an SYN cookie, in which the server utilizes cryptographic hashing in
order to confirm as legitimate a TCP request before allotting any memory to it. With an SYN
cookie, the recipient responds with an SYN-ACK, but without adding a fresh record to its SYN
Queue. Instead, it does this only when the SYN-ACK has been responded to (something that
doesnt happen in an SYN flood attack).
Another approach is an RST cookie, whereby the server will purposely send an incorrect
response after it receives the initiating SYN request. In the case of a genuine request, the
server will receive an RST packet that alerts the server that something has gone awry.
Still another approach involves micro-blocks, whereby the server allocates a micro-record for
every SYN request, rather than a complete connection object. This reduces straining
resources in the event that they have to deal with too many requests. Some of the newer
versions of this micro-block approach can allocate amounts as tiny as 16-bytes in response
to incoming SYN objects.
One final approach to reducing the potentially devastating effect of SYN floods is called stack
tweaking. In this response, the timeout before a stack frees up might be reduced.
Alternatively, it may selectively choose to drop connections that are incoming.
Also Read: 5 Simple Ways To Improve Your Data Security
SYN floods arent the only DDoS games in town
Source: tek-tools.com
Source: eetasia.com
As noted, SYN floods are far from the only kind of DDoS attack users can face here in 2020.
DDoS attacks can be extremely damaging, resulting in significant unwanted downtime and,
potentially, financial and reputational losses in the event that it causes organizations to be
able to service customers.
DDoS attacks come in many forms, and each variant requires different approaches for
dealing with them. As these attacks become more widespread and virulent, its crucial that
every organization is properly protected against them. Unless youre an authority on
cybersecurity with a lot of time on your hands to keep up to date, its a smart move to bring in
the experts to help.
There are plenty of things to occupy your time running a business or other organization.
Adding defending against all cyberattacks may be one task too many.
Contact Us :
Website : https://technographx.com
Email Id :   technographxofficial@gmail.com
To Connect With Us Visit

More Related Content

Similar to How to mitigate tcp syn flood attacks (20)

MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
ssuser262297
DoS Attacks
DoS AttacksDoS Attacks
DoS Attacks
Vladimir Menshikov
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Kent State University
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
What is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdfWhat is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdf
uzair
Drdos
DrdosDrdos
Drdos
Marc Manthey
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
extralargesand
Internet Security Issues
Internet Security IssuesInternet Security Issues
Internet Security Issues
anides
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
IJNSA Journal
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
IJNSA Journal
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
Protection of server from syn flood attack
Protection of server from syn flood attackProtection of server from syn flood attack
Protection of server from syn flood attack
IAEME Publication
DoS final , what us ddos attack and .pptx
DoS final , what us ddos attack and .pptxDoS final , what us ddos attack and .pptx
DoS final , what us ddos attack and .pptx
abdullahaliali897
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
Hai Nguyen
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
Vihari Piratla
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
Raleigh ISSA
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
ssuser262297
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Kent State University
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
What is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdfWhat is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdf
uzair
Internet Security Issues
Internet Security IssuesInternet Security Issues
Internet Security Issues
anides
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
IJNSA Journal
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
IJNSA Journal
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
Protection of server from syn flood attack
Protection of server from syn flood attackProtection of server from syn flood attack
Protection of server from syn flood attack
IAEME Publication
DoS final , what us ddos attack and .pptx
DoS final , what us ddos attack and .pptxDoS final , what us ddos attack and .pptx
DoS final , what us ddos attack and .pptx
abdullahaliali897
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
Hai Nguyen
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
Raleigh ISSA

Recently uploaded (20)

UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
The Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond DenesThe Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond Denes
ScyllaDB
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Precisely
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Jonathan Bowen
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
The Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond DenesThe Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond Denes
ScyllaDB
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Stronger Together: Combining Data Quality and Governance for Confident AI & A...
Precisely
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Jonathan Bowen
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB

How to mitigate tcp syn flood attacks

  • 1. How to Mitigate TCP Syn Flood Attacks From a user perspective, signing onto the internet is so straightforward that most people dont even question it. When your computer or mobile device connects to the internet, the process of logging onto the network and obtaining your unique internet address for sending and receiving data is all thanks to something called the internet protocol suite. Of this set of protocols, among the most critical is the transmission Control Protocol (TCP), the internet standard when it comes to the successful exchanging of data packets over a network. Whether its email applications, peer-to-peer apps, FTP, or web servers and websites, the TCP protocol is what makes everything possible when it comes to online communication. To work, a TCP connection needs to make what is referred to as a three-way handshake, involving both the client and the server. To begin the handshake, the client sends the server an SYN packet connection request. The server then answers with an SYN/ACK packet, which acknowledges the connection request has been made. As the last step, the client having received the SYN/ACK packet responds with an ACK packet. This process is technically referred to as the SYN, SYN-ACK, ACK sequence. The three-way handshake might sound like a simple greeting (a bit like saying hello to a buddy, getting a hey! back, and then responding with another message to confirm that you were initiating a conversation), but its an important interaction not least because it adds an element of security that protects against spoofing.
  • 2. TCP has its weaknesses Source: amazonaws.com But TCP isnt infallible. Its vulnerable to several types of DDoS (distributed denial of service) attacks. The most common of these is an SYN flood. In a DDoS attack, the attacker targets the victim with large quantities of junk traffic with the aim of overwhelming their system and causing it to become inaccessible to legitimate traffic. An SYN flood takes place during the three-way handshake process described above. The difference is that, unlike a normal SYN, SYN-ACK, ACK sequence, in an SYN flood attack these hello requests are sent by the attacker to every port on a victims machine at a rate that is faster than its able to process. Overloaded by trying to process too many fake SYN requests at once, the machine stops being able to respond to legitimate TCP requests. This type of attack is also known as a TCP State-Exhaustion Attack. While the premise of the attack might sound simple, an SYN flood can bring even the highest capacity devices, capable of millions of connections, to a standstill. While an SYN flood counts as a DDoS attack, it is different in one keyway. A regular DDoS attack aims to use up a targets memory. An SYN flood instead works by overloading the open connections that are connected to a port. Every time an SYN packet connection request is made, the TCP goes into a listen state. Exploiting this behavior, the SYN flood causes the host to enter this state, responding to fake
  • 3. half- connections, until it has no resources left. SYN floods are sometimes referred to as half-open attacks for this reason. Defending against SYN flood vulnerabilities Source: cloudflare.com The vulnerability that could lead to a TCP SYN flood was first discovered as far back as 1994 by security researchers Bill Cheswick and Steve Bellovin. At the time, there was no existing countermeasure that could protect against such an attack. Fortunately, things have advanced in the years since. Several methods of mitigating SYN floods now exist. One such example is an SYN cookie, in which the server utilizes cryptographic hashing in order to confirm as legitimate a TCP request before allotting any memory to it. With an SYN cookie, the recipient responds with an SYN-ACK, but without adding a fresh record to its SYN Queue. Instead, it does this only when the SYN-ACK has been responded to (something that doesnt happen in an SYN flood attack). Another approach is an RST cookie, whereby the server will purposely send an incorrect response after it receives the initiating SYN request. In the case of a genuine request, the server will receive an RST packet that alerts the server that something has gone awry.
  • 4. Still another approach involves micro-blocks, whereby the server allocates a micro-record for every SYN request, rather than a complete connection object. This reduces straining resources in the event that they have to deal with too many requests. Some of the newer versions of this micro-block approach can allocate amounts as tiny as 16-bytes in response to incoming SYN objects. One final approach to reducing the potentially devastating effect of SYN floods is called stack tweaking. In this response, the timeout before a stack frees up might be reduced. Alternatively, it may selectively choose to drop connections that are incoming. Also Read: 5 Simple Ways To Improve Your Data Security SYN floods arent the only DDoS games in town Source: tek-tools.com
  • 5. Source: eetasia.com As noted, SYN floods are far from the only kind of DDoS attack users can face here in 2020. DDoS attacks can be extremely damaging, resulting in significant unwanted downtime and, potentially, financial and reputational losses in the event that it causes organizations to be able to service customers. DDoS attacks come in many forms, and each variant requires different approaches for dealing with them. As these attacks become more widespread and virulent, its crucial that every organization is properly protected against them. Unless youre an authority on cybersecurity with a lot of time on your hands to keep up to date, its a smart move to bring in the experts to help. There are plenty of things to occupy your time running a business or other organization. Adding defending against all cyberattacks may be one task too many.
  • 6. Contact Us : Website : https://technographx.com Email Id : technographxofficial@gmail.com To Connect With Us Visit