SYN-flood

SYN-Flood


Updated September 19, 1999


SYN-flood is a simple attack method on computers on the Internet. The technique makes the hosting server so busy that it can´t provide service to the legitimate users.

Unfortunately SYN-flood is both difficult to detect and avoid. It is based on the fundamental technique for transfer of data on the internet, the TCP-protocol. The attack exploits the way TCP-connections are established between two computers on the internet.

- When a user connects to a host computer (server) the user´s computer sends a request containing a packet with a setting, a so called SYN-flag.

- The server receives the request and returns a response, the response is called a SYN/ACK packet.

The user´s computer receives the SYN/ACK and sends a packet, a ACK that establishes the connection.

The transaction takes approximately 1 minute and the host computer waits for the ACK to be returned from the users computer. The attacker utilizes this time slot for the attack.

The attacker creates a program that generates a huge number of SYN requests, which makes the server respond with SYN/ACK and then waits without returning the expected ACK-packet which would establish the connection between the server and user. Most servers has a limited number of simultaneous connections so it is rather easy to lock a server using this technique.

The attackers make the request look valid but unreachable by using non-existing IP-addresses and this makes the attack difficult to trace. Software for creating such attacks is easily available on the net.


    SYN-Flood     FASTER BROWSING     MAGIC COOKIES     RESOURCE EDITORS

    SEARCH ENGINE TACTICS     SEARCH THE WEB     LINKS

    DISCLAIMER


Back to FrontPage


The Homepage. 1998 by Mickey