Changes

Jump to: navigation, search

An Overview of IT Security Threats and Attacks

41 bytes added, 16:03, 13 February 2008
no edit summary
* '''Smurfing''' - As with Ping Flood attacks, smurfing makes use of the Internet Message Protocol (ICMP) ''ping'' request to mount DoS attacks. In a typical smurfing attack the attacker sends a ping request to the broadcast address of network containing the IP address of the victim. The ping request is sent to all computers on the broadcast network, which in turn all reply to the IP address of the victim system thereby overloading the victim with ping responses. The primary method for preventing smurf attacks is to block ICMP traffic through routers so that the ping responses are blocked from reaching internal servers.
* '''TCP SYN Flood''' -Also known as the ''TCP Ack Attack''

Navigation menu