If an attacker discovers the presence of the Juniper Networks security device, the
attacker might launch a denial of service (DoS) attack against the security device
instead of the network behind it. A successful DoS attack against a firewall amounts
to a successful DoS attack against the protected network in that it thwarts attempts
of legitimate traffic to traverse the firewall. This section explains the two methods
an attacker might use to fill up the session table of a Juniper Networks security
device and thereby produce a DoS: session table flood and SYN-ACK-ACK proxy
flood.
Session Table Flood
A successful DoS attack overwhelms its victim with such a massive barrage of false
traffic that the victim becomes unable to process legitimate connection requests.
DoS attacks can take many forms—SYN flood, SYN-ACK-ACK flood, UDP flood,
ICMP flood, and so on—but they all have the same objective: to fill up their victim’s
session table. When the session table is full, that host cannot create any new
sessions and begins rejecting new connection requests.
'Hacking' 카테고리의 다른 글
SYN Cookie (0) | 2011.08.03 |
---|---|
A successful DoS attack overwhelms its victim with such a massive barrage of false (0) | 2011.07.28 |
IP Spoofing (1) | 2011.07.28 |
Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit (2) | 2011.04.02 |
Antivirus and Security software coupons (0) | 2011.03.26 |