Changes

Jump to navigation Jump to search
Line 13: Line 13:     
==Packet Flooding Attack==
 
==Packet Flooding Attack==
'''Packet Flooding Attack''' is the most common type of Denial of Service Attack.The modus operandi of intruders is sending more than acceptable number of packets to a particular destination. There are several types of packets used by Packet Flooding Attack tools including:
+
'''Packet Flooding Attack''' is the most common type of Denial of Service Attack.The modus operandi of intruders is sending more than acceptable number of packets to a particular destination which consumes the entire bandwidth resources. There are several types of packets used by Packet Flooding Attack tools including:
 
* '''[[TCP]] Floods'''- SYN, ACK and RST flags are sent to the victim's [[IP]] Address
 
* '''[[TCP]] Floods'''- SYN, ACK and RST flags are sent to the victim's [[IP]] Address
 
* '''[[ICMP]] echo request reply (Ping Floods)'''- A stream of ICMP is sent to the victim's IP Address
 
* '''[[ICMP]] echo request reply (Ping Floods)'''- A stream of ICMP is sent to the victim's IP Address
 
* '''[[UDP]] Floods'''- A stream of UDP is sent to the victim's IP Address
 
* '''[[UDP]] Floods'''- A stream of UDP is sent to the victim's IP Address
 +
 +
These attack tools changes the characteristics of packets in the packet stream such as the '''Source IP Address''' to hide the real source of the packet stream. The method of sending packet streams to one or more intermediate sites to create responses that will be sent to a victim is called '''IP Spoofing.'''<ref>[http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Spoofing/default.htm Spoofing]</ref> Other packet stream attribute being altered by intruders are the '''Source/Destination Ports''' and '''Other IP Header Values''''.
    
==References==
 
==References==
9,082

edits

Navigation menu