Results 1 to 4 of 4

Thread: TCP SYN Attack

  1. #1
    Join Date
    Sep 2009
    Posts
    77

    TCP SYN Attack

    I have P4 machine, on which Windows Xp has been running as my operating system. I would like like to know that what is TCP SYN attack? Is TCP SYN attack dangerous for our system? Does any body have any idea about it? Let me know your views on the above topic. Any help you can provide would be greatly appreciated.

  2. #2
    Join Date
    Jan 2006
    Posts
    3,792

    Re: TCP SYN Attack

    The TCP SYN Flooding attack consists of a tool that only implements one portion of the Sequence Number Guessing attack, with a completely different focus. There is a potential denial of service attack at internet service providers (ISPs) that targets network device. A sender transmits a volume of connections that cannot be completed.

  3. #3
    Join Date
    May 2008
    Posts
    2,945

    Re: TCP SYN Attack

    TCP Syn Attack is a type of denial of service (DOS) attack in which a sender transmits a volume of connections that cannot be completed. While SYN attacks may not be entirely preventable, tuning the TCP/IP stack will help reduce the impact of SYN attacks while still allowing legitimate client traffic through. The SYN flood attack sends TCP connections requests faster than a machine can process them. This causes the connection queues to fill up, thereby denying service to legitimate TCP users. A TCP SYN attack (also called SYN attack) is a common type of Denial of Service attack.

  4. #4
    Join Date
    Feb 2008
    Posts
    2,635

    Re: TCP SYN Attack

    TCP "SYN" Attack is also known as SYN Flooding. It takes advantage of a flaw in how most hosts implement the TCP three-way handshake. The TCP SYN attack exploits this design by having an attacking source host generate TCP SYN packets with random source addresses toward a victim host. Using a spoofed IP address not in use on the Internet, an attacker sends multiple SYN packets to the target machine. This causes the connection queues to fill up, thereby denying service to legitimate TCP users.

Similar Threads

  1. wormhole attack and simulating blackhole attack in ns-2
    By mANICKAVASAN in forum Networking & Security
    Replies: 9
    Last Post: 02-02-2012, 12:16 AM
  2. Fraudpack attack on my PC
    By Jecco in forum Networking & Security
    Replies: 4
    Last Post: 17-04-2010, 07:26 AM
  3. Dictionary Attack
    By Emma.J in forum Off Topic Chat
    Replies: 3
    Last Post: 22-08-2009, 04:49 PM
  4. Kaspersky says someone is trying to attack me
    By Bhagesh in forum Technology & Internet
    Replies: 3
    Last Post: 16-01-2009, 10:25 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,445,116.00800 seconds with 17 queries