Planet Technology G.SHDSL.bis Bridge Router GRT-504 User Manual

Page 21

Advertising
background image

GRT-504 4-Wire G.SHDSL.bis Firewall Router User’s Manual

Hacker 's

System

Target

System

Internet

TCP SYN

requests

Backing

quene

TCP SYN-ACK

Packets


ICMP Flood- The attacker transmits a volume of ICMP request packets to cause all CPU
resources to be consumed serving the phony requests.

UDP Flood- The attacker transmits a volume of requests for UDP diagnostic services, which
cause all CPU resources to be consumed serving the phony requests.

Land attack- The attacker attempts to slow your network down by sending a packet with identical
source and destination addresses originating from your network.

IP Spoofing- IP Spoofing is a method of masking the identity of an intrusion by making it appeared
that the traffic came from a different computer. This is used by intruders to keep their anonymity
and can be used in a Denial of Service attack.

Smurf attack- The source address of the intended victim is forged in a broadcast ping so that a
huge number of ICMP echo reply back to victim indicated by the address, overloading it.

Hacker 's

System

Multiple network

Subnet

Internet

Broadcast ping

request from spoofed

IP address

Target Router

Ping response




Fraggle Attack- A perpetrator sends a large amount of UDP echo packets at IP broadcast
addresses, all of it having a fake source address.

20

Advertising