NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Denial of Service (DoS)
|
|
Distributed DoS (DDoS)
|
|
SYN Flood
|
|
Spoofing
|
Detailed explanation-1: -A SYN flood attack randomly opens TCP ports at the source of the attack and ties up the network equipment or computer with a large amount of false SYN requests. This causes sessions to be denied to others. A SYN flood attack is a type of DoS attack.
Detailed explanation-2: -SYN flood attacks work by exploiting the handshake process of a TCP connection.
Detailed explanation-3: -In a DoS land (Local Area Network Denial) attack, the attacker sends a TCP SYN spoofed packet where source and destination IPs and ports are set to be identical.
Detailed explanation-4: -A RST-SYN flood is a DDoS attack designed to disrupt network activity by saturating bandwidth and resources on stateful devices in its path. By continuously sending RST-SYN packets towards a target, stateful defenses can go down (In some cases into a fail open mode).