How do you protect your network against SYN Flood attacks?

The SYN flood attack sends TCP connections requests faster than a machine can process them.

✑ Attacker creates a random source address for each packet

✑ SYN flag set in each packet is a request to open a new connection to the server from the spoofed IP address

✑ Victim responds to spoofed IP address, then waits for confirmation that never arrives (timeout wait is about 3 minutes)

✑ Victim’s connection table fills up waiting for replies and ignores new connections

✑ Legitimate users are ignored and will not be able to access the server

How do you protect your network against SYN Flood attacks?
A . SYN cookies. Instead of allocating a record, send a SYN-ACK with a carefully constructed sequence number generated as a hash of the clients IP address, port number, and other information. When the client responds with a normal ACK, that special sequence number will be included, which the server then verifies. Thus, the server first allocates memory on the third packet of the handshake, not the first.
B . RST cookies – The server sends a wrong SYN/ACK back to the client. The client should then generate a RST packet telling the server that something is wrong. At this point, the server knows the client is valid and will now accept incoming connections from that client normally
C . Check the incoming packet’s IP address with the SPAM database on the Internet and enable the filter using ACLs at the Firewall
D . Stack Tweaking. TCP stacks can be tweaked in order to reduce the effect of SYN floods. Reduce the timeout before a stack frees up the memory allocated for a connection
E . Micro Blocks. Instead of allocating a complete connection, simply allocate a micro record of 16-bytes for the incoming SYN object

Answer: A,B,D,E

Latest CEH-001 Dumps Valid Version with 878 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments