Page 1203 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1203

chapter) are examples.


               SYN Flood Attack

               The SYN flood attack is a common DoS attack. It disrupts the
               standard three-way handshake used by Transmission Control Protocol

               (TCP) to initiate communication sessions. Normally, a client sends a
               SYN (synchronize) packet to a server, the server responds with a
               SYN/ACK (synchronize/acknowledge) packet to the client, and the
               client then responds with an ACK (acknowledge) packet back to the
               server. This three-way handshake establishes a communication

               session that the two systems use for data transfer until the session is
               terminated with FIN (finish) or RST (reset) packets.

               However, in a SYN flood attack, the attackers send multiple SYN
               packets but never complete the connection with an ACK. This is
               similar to a jokester sticking his hand out to shake hands, but when
               the other person sticks his hand out in response, the jokester pulls his
               hand back, leaving the other person hanging.

               Figure 17.2 shows an example. In this example, a single attacker has

               sent three SYN packets and the server has responded to each. For each
               of these requests, the server has reserved system resources to wait for
               the ACK. Servers often wait for the ACK for as long as three minutes
               before aborting the attempted session, though administrators can
               adjust this time.
   1198   1199   1200   1201   1202   1203   1204   1205   1206   1207   1208