Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Denial Of service attacks

Posted on 1997-02-20
1
Medium Priority
?
307 Views
Last Modified: 2010-03-18
Where can I obtain a firewall/patch/protection against D-O-S attacks such as ICMP and other such packet floods\attacks (for linux 2.0.x)?
0
Comment
Question by:boom022097
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
xterm earned 100 total points
ID: 1584129
If you want an actual firewall, search on Socks5 -- it's the
premier firewall software, compiles clean, relatively easy
to configure.
The 'big ping' problem was solved back around the 2.0.24
kernel, so if you're later than that, you are at least safe
from being rebooted via DOS ping 64+ K pings.
Best bet:  Get icmpinfo.  A small, resident little prog that
takes up maybe 5 K of RAM - It will monitor ALL incoming pings,
malicious or not and write them to your syslog (if you choose
that option as I did.)  Very handy for mailing admins of the
offending server....
0

Featured Post

Optimum High-Definition Video Viewing and Control

The ATEN VM0404HA 4x4 4K HDMI Matrix Switch supports 4K resolutions of UHD (3840 x 2160) and DCI (4096 x 2160) with refresh rates of 30 Hz (4:4:4) and 60 Hz (4:2:0). It is ideal for applications where the routing of 4K digital signals is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question