Planet GRT-504 User Manual page 21

4-wire g.shdsl.bis firewall router
Hide thumbs Also See for GRT-504:
Table of Contents

Advertisement

Hacker 's
System
ICMP Flood- The attacker transmits a volume of ICMP request packets to cause all CPU
resources to be consumed serving the phony requests.
UDP Flood- The attacker transmits a volume of requests for UDP diagnostic services, which
cause all CPU resources to be consumed serving the phony requests.
Land attack- The attacker attempts to slow your network down by sending a packet with identical
source and destination addresses originating from your network.
IP Spoofing- IP Spoofing is a method of masking the identity of an intrusion by making it appeared
that the traffic came from a different computer. This is used by intruders to keep their anonymity
and can be used in a Denial of Service attack.
Smurf attack- The source address of the intended victim is forged in a broadcast ping so that a
huge number of ICMP echo reply back to victim indicated by the address, overloading it.
Hacker 's
System
Fraggle Attack- A perpetrator sends a large amount of UDP echo packets at IP broadcast
addresses, all of it having a fake source address.
TCP SYN
Internet
requests
Backing
quene
Broadcast ping
Internet
request from spoofed
IP address
Target Router
GRT-504 4-Wire G.SHDSL.bis Firewall Router User's Manual
TCP SYN-ACK
Packets
Ping response
20
Target
System
Multiple network
Subnet

Advertisement

Table of Contents
loading

Table of Contents