導覽
近期變更
隨機頁面
新手上路
新頁面
優質條目評選
繁體
不转换
简体
繁體
18.116.88.132
登入
工具
閱讀
檢視原始碼
特殊頁面
頁面資訊
求真百科歡迎當事人提供第一手真實資料,洗刷冤屈,終結網路霸凌。
檢視 Syn flood 的原始碼
←
Syn flood
前往:
導覽
、
搜尋
由於下列原因,您沒有權限進行 編輯此頁面 的動作:
您請求的操作只有這個群組的使用者能使用:
用戶
您可以檢視並複製此頁面的原始碼。
The Syn flood uses the three-time handshake mechanism of TCP. The attacker sends a request to the attacked end using the forged IP address, and the response message sent by the attacked end will never be sent to the destination. Then the attacked end consumes resources while waiting for the connection to be closed. If there are thousands of such connections, the host resources will be exhausted, so as to achieve the purpose of the attack. TCP Syn flood occurs in the fourth layer of OSI. This method uses the characteristics of TCP protocol, that is, triple handshake. The attacker sends TCP syn, which is the first packet in the three TCP handshakes. When the server returns an ACK, the attacker does not reconfirm it. Then the TCP connection is in the suspended state, that is, the so-called semi connected state. If the server does not receive the reconfirmation, it will repeatedly send an ack to the attacker. This will even waste the resources of the server. The attacker sends a large number of such TCP connections to the server. Since each TCP connection cannot complete three handshakes, these TCP connections on the server will consume CPU and memory because of the suspended state. Finally, the server may crash and cannot provide services to normal users.
返回「
Syn flood
」頁面