Tp-Link T2600G-28MPS (TL-SG3424P) [308/379] Dos defend

Tp-Link T2600G-28MPS (TL-SG3424P) [308/379] Dos defend
DoS Attack Type Description
control fields set to 0. During the TCP connection and data
transmission, the packets with all the control fields set to 0 are
considered as the illegal packets.
SYN packet with its
source port less than
1024
The attacker sends the illegal packet with its TCP SYN field set to 1
and source port less than 1024.
Blat Attack
The attacker sends the illegal packet with its source port and
destination port on Layer 4 the same and its URG field set to 1.
Similar to the Land Attack, the system performance of the attacked
Host
is reduced since the Host circularly attempts to build a
connection with the attacker.
Ping Flooding
The attacker floods the destination system with Ping broadcast
storm packets to forbid the system to respond to the legal
communication.
SYN/SYN-ACK
Flooding
The attacker uses a fake IP address to send TCP request packets to
the Server. Upon receiving the request packets, the Server
responds with SYN-
ACK packets. Since the IP address is fake, no
response will be returned. The Server will keep on sending SYN-ACK
packets. If the attacker sends overflowing fake request packets, the
network resource will be occupied maliciously and the requests of
the legal clients will be denied.
Table 14-1 Defendable DoS Attack Types
14.8.1 DoS Defend
On this page, you can enable the DoS Defend type appropriate to your need.
296

Содержание

Скачать