Dos Defend - TP-Link T2500G-10TS User Manual

Jetstream gigabit l2 managed switch
Hide thumbs Also See for T2500G-10TS:
Table of Contents

Advertisement

DoS Attack Type
Smurf Attack
Blat Attack
Ping Flooding
SYN/SYN-ACK
Flooding
winNuke Attack
Ping Of Death

12.3.1 DoS Defend

On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu Network Security→DoS Defend→DoS Defend to load the following page.
By pretending to be a Host, the attacker broadcasts request packets
for ICMP response in the LAN. When receiving the request packet,
all the Hosts in the LAN will respond and send the reply packets to
the actual Host, which will causes this Host to be attacked.
The attacker sends the illegal packet with its source port and
destination port on Layer 4 the same and its URG field set to 1.
Similar to the Land Attack, the system performance of the attacked
Host is reduced since the Host circularly attempts to build a
connection with the attacker.
The attacker floods the destination system with Ping broadcast
storm packets to forbid the system to respond to the legal
communication.
The attacker uses a fake IP address to send TCP request packets to
the Server. Upon receiving the request packets, the Server
responds with SYN-ACK packets. Since the IP address is fake, no
response will be returned. The Server will keep on sending SYN-ACK
packets. If the attacker sends overflowing fake request packets, the
network resource will be occupied maliciously and the requests of
the legal clients will be denied.
Since the Operation System with bugs cannot correctly process the
URG (Urgent Pointer) of TCP packets, the attacker sends this type of
packets to the TCP port139 (NetBIOS) of the Host with the
Operation System bugs, which will cause the Host with a blue
screen.
ICMP ECHO Request Packet whose sum of "Fragment Offset" and
"Total Length" fields in the IP header is greater than 65535 may
cause Ping of Death attack. As the maximum packet length of an
IPv4 packet including the IP header is 65,535 bytes, many computer
systems could not properly handle this malformed or malicious
ICMP ECHO Request Packet. Thus, the hosts may break down or
reboot automatically when receive this kind of packet.
Table 12-1 Defendable DoS Attack Types
Description
203

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-sg3210

Table of Contents