求真百科歡迎當事人提供第一手真實資料,洗刷冤屈,終結網路霸凌。

Syn flood檢視原始碼討論檢視歷史

事實揭露 揭密真相
於 2022年6月27日 (一) 15:37 由 4521552651對話 | 貢獻 所做的修訂 (创建页面,内容为“The Syn flood uses the three-time handshake mechanism of TCP. The attacker sends a request to the attacked end using the forged IP address, and the response message…”)
(差異) ←上個修訂 | 最新修訂 (差異) | 下個修訂→ (差異)
前往: 導覽搜尋

The Syn flood uses the three-time handshake mechanism of TCP. The attacker sends a request to the attacked end using the forged IP address, and the response message sent by the attacked end will never be sent to the destination. Then the attacked end consumes resources while waiting for the connection to be closed. If there are thousands of such connections, the host resources will be exhausted, so as to achieve the purpose of the attack. TCP Syn flood occurs in the fourth layer of OSI. This method uses the characteristics of TCP protocol, that is, triple handshake. The attacker sends TCP syn, which is the first packet in the three TCP handshakes. When the server returns an ACK, the attacker does not reconfirm it. Then the TCP connection is in the suspended state, that is, the so-called semi connected state. If the server does not receive the reconfirmation, it will repeatedly send an ack to the attacker. This will even waste the resources of the server. The attacker sends a large number of such TCP connections to the server. Since each TCP connection cannot complete three handshakes, these TCP connections on the server will consume CPU and memory because of the suspended state. Finally, the server may crash and cannot provide services to normal users.