Go to top

Trang chủ  » Thiết kế website giá rẻ

Phân tích phát hiện tấn công DDos và giải pháp


CERT® Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks

Original issue date: September 19, 1996
Last revised: November 29, 2000
Updated vendor information for the Linux kernel.

A complete revision history is at the end of this file. This advisory supersedes the IP spoofing portion of CA-95.01.

Two "underground magazines" have recently published code to conduct denial-of-service attacks by creating TCP "half-open" connections. This code is actively being used to attack sites connected to the Internet. There is, as yet, no complete solution for this problem, but there are steps that can be taken to lessen its impact. Although discovering the origin of the attack is difficult, it is possible to do; we have received reports of attack origins being identified.

Any system connected to the Internet and providing TCP-based network services (such as a Web server, FTP server, or mail server) is potentially subject to this attack. Note that in addition to attacks launched at specific hosts, these attacks could also be launched against your routers or other network server systems if these hosts enable (or turn on) other TCP services (e.g., echo). The consequences of the attack may vary depending on the system; however, the attack itself is fundamental to the TCP protocol used by all systems.

If you are an Internet service provider, please pay particular attention to Section III and Appendix A, which describes step we urge you to take to lessen the effects of these attacks. If you are the customer of an Internet service provider, please encourage your provider to take these steps.

This advisory provides a brief outline of the problem and a partial solution. We will update this advisory as we receive new information. If the change in information warrants, we may post an updated advisory on comp.security.announce and redistribute an update to our cert-advisory mailing list. As always, the latest information is available at the URLs listed at the end of this advisory.


Các tin tức khác:

Những bí mật về IMEI và truy tìm điện thoại di động bị mất

Ben Edelman - kẻ thù nguy hiểm nhất của spyware

Website nào có ảnh hưởng nhất năm 2003?

VNPT cung cấp dịch vụ trên mạng di động

Harry Potter chinh phục không gian điều khiển

Cá heo - 'khách hàng' mới của dịch vụ liên lạc di động

RealNetworks ''hoá giải'' công nghệ iTunes, hỗ trợ iPod

Symantec ban hành Norton Ghost 9.0

Microsoft cung cấp bản nâng cấp phần mềm quản lý ảnh

Zotob hạ gục máy tính 13 nhà máy của DaimlerChrysler

Danh mục

Hãy gọi cho chúng tôi để được tư vấn miễn phí

0989 722 522


Địa chỉ: 41/1, Phường Trung Mỹ Tây Quận 12, TP Hồ Chí Minh.
Email: hotro@topsite.vn - info@topsite.vn Tel: 0978.893.678 - 0938 869 787
MSDN/GPĐKKD: 19025687954
MST: 0310368322
Số TK: 0501000001371 tại Ngân Hàng Vietcombank Chi nhánh Vĩnh Lộc
© 2004 - 2014 Copyright. All rights reserved. Bản quyền thuộc về công ty thiet ke web ITECHCO CO.,LTD

Chúng tôi chấp nhận thanh toán qua:

liberty reservengan luongonepaysoha payvisaweb money1web money2paypalpayone