Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Computer Networks Question In a SYN Flood Attack an attacker sends SYN packets a

ID: 3585737 • Letter: C

Question

Computer Networks Question

In a SYN Flood Attack an attacker sends SYN packets at a high rate to a server without every completing the third handshake (the final client to server ACK the finalizes a connection). The server allocates resources (to store connection state information) for each received SYN and exhausts it connection resources preventing valid connections from being made. The SYN cookie approach (RFC 4987) is an effective defense against SYN Flood Attacks because the server does not need to allocate resources on a received SYN. For the standard TCP handshake (i.e., not using SYN cookies), exactly what state must be stored on the receipt of a SYN?

Explanation / Answer

Flood Attack

Flood Attack is somewhat a form of DoS attack in which the attacker is responsible for sending the SYN request to the target's system and getting it to consume enough of the server resources which in result makes the system hang out or unresponsive for the users to use.

The counter-measures that can be made to make the Flood Attack fail are as follows:

When we talk about SYN Cookies they may be the best technique in resisting the SYN Flood Attacks. The technique is basically used to make distinct choices for the initial TCP sequence numbers by the TCP servers.

The process of SYN Cookies is as follows:

Drawbacks of using SYN Cookies:

The drawbacks of using SYN cookies are as follows:

Hence,these are the SYN Flood Attack and how to resolve them using the SYN Cookies and all the drawbacks of the SYN Cookies.

Rate an upvote.....Thankyou

Hope this helps......

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote