Go to top

Trang chủ  » Thiết kế website giá rẻ

Phân tích phát hiện tấn công DDos và giải pháp


CERT® Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks

Original issue date: September 19, 1996
Last revised: November 29, 2000
Updated vendor information for the Linux kernel.

A complete revision history is at the end of this file. This advisory supersedes the IP spoofing portion of CA-95.01.

Two "underground magazines" have recently published code to conduct denial-of-service attacks by creating TCP "half-open" connections. This code is actively being used to attack sites connected to the Internet. There is, as yet, no complete solution for this problem, but there are steps that can be taken to lessen its impact. Although discovering the origin of the attack is difficult, it is possible to do; we have received reports of attack origins being identified.

Any system connected to the Internet and providing TCP-based network services (such as a Web server, FTP server, or mail server) is potentially subject to this attack. Note that in addition to attacks launched at specific hosts, these attacks could also be launched against your routers or other network server systems if these hosts enable (or turn on) other TCP services (e.g., echo). The consequences of the attack may vary depending on the system; however, the attack itself is fundamental to the TCP protocol used by all systems.

If you are an Internet service provider, please pay particular attention to Section III and Appendix A, which describes step we urge you to take to lessen the effects of these attacks. If you are the customer of an Internet service provider, please encourage your provider to take these steps.

This advisory provides a brief outline of the problem and a partial solution. We will update this advisory as we receive new information. If the change in information warrants, we may post an updated advisory on comp.security.announce and redistribute an update to our cert-advisory mailing list. As always, the latest information is available at the URLs listed at the end of this advisory.


Các tin tức khác:

Website nào có ảnh hưởng nhất năm 2003?

Google vô địch tìm kiếm web, nhưng còn nhiều thử thách

Internet sẽ biến chuyển như thế nào dưới góc nhìn của Yahoo?

Cảnh báo virus: W32.Beagle.AG@mm

Công ty thiết kế web thành phố HCM

Tham quan bảo tàng Nobel trên mạng

"Mồi mới" của kẻ câu trộm tài chính

Bộ Thương mại và Bộ Bưu chính Viễn thông đã có ý kiến về ''vụ'' OCI

Windows: Trình bày lại menu “New” trong Context menu

Khóa đào tạo giảng viên Linux đầu tiên ở Việt Nam

Danh mục

Hãy gọi cho chúng tôi để được tư vấn miễn phí

0989 722 522


Địa chỉ: 41/1, Phường Trung Mỹ Tây Quận 12, TP Hồ Chí Minh.
Email: hotro@topsite.vn - info@topsite.vn Tel: 0978.893.678 - 0938 869 787
MSDN/GPĐKKD: 19025687954
MST: 0310368322
Số TK: 0501000001371 tại Ngân Hàng Vietcombank Chi nhánh Vĩnh Lộc
© 2004 - 2014 Copyright. All rights reserved. Bản quyền thuộc về công ty thiet ke web ITECHCO CO.,LTD

Chúng tôi chấp nhận thanh toán qua:

liberty reservengan luongonepaysoha payvisaweb money1web money2paypalpayone