D-Link DRO-250i User Manual page 73

Hide thumbs Also See for DRO-250i:
Table of Contents

Advertisement

Configuring DRO-250i
IDS Configuration - To Enable or Disable IDS
Flood Attack - SYN flood attack, ICMP flood attack, ICMP Echo storm
attack are detected under this category. In these attacks, packets are
flooded continuously on the target machine.
Ping of Death - A form of DoS (denial of service) attack consisting of a
flood of ping requests designed to disrupt the normal activity of a system.
Boink Attack - It involves the perpetrator sending corrupt UDP packets to
host.
Smurf Attack - The "smurf" attack, named after its exploit program, is
the most recent in the category of network-level attacks against hosts.
TCP SYN Attack - TCP SYN/ACK attack, FIN attack, RESET attack are
detected under this category. These attacks exploit the TCP 3 way
handshake.
Port scan Attack - Netbus scan, Back orifice scan, Echo chargen scan,
UDP echo scan, Chargen scan, IMAP scan are detected under this
category. Particular ports are scanned under this attack.
Land Attack - The Land attack involves the perpetrator sending spoofed
packet(s) with the SYN flag set to the victim's machine on any open port
that is listening. If the packet(s) contain the same destination and source IP
address as the host, the victim's machine could hang or reboot.
Winnuke Attack - Denial of service attack to any windows 95/NT/3.x
user by sending OOB data to an established connection on port 139
[NetBIOS].
XMAS-Tree Attack - DoS technique that sets all TCP header flags to on
in an attempt to gain information regarding a network.
DRO-250i User Manual
72

Advertisement

Table of Contents
loading

Table of Contents