Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

DOS attack

Posted on 2006-11-23
1
Medium Priority
?
380 Views
Last Modified: 2012-05-05
What techniques are used to secure against DOS attacks, i.e. someone killing the signal over WI-FI?
0
Comment
Question by:pma111
1 Comment
 
LVL 32

Accepted Solution

by:
rsivanandan earned 500 total points
ID: 18002762
A stateful firewall which does proxy service would help you protect from the dos attacks.

In a denial of service attack, remote host(s) keep send the syn packet which basically is flooded a machine (usually a webserver kinda) and when its tcp/ip buffer runs over it breaks down.

So when you put in a firewall, what it does is it takes the hit on the firewall and saves the internal machines from doing it.

How it does?
1. An external host sends a syn packet.
2. Firewall responds with a syn+ack to the external host (at this point, the internal server doesn't even know that there is something going on like this).
3. If the external hosts sends an ack packet, then the firewall creates a new session by syn to ack to the internal server.
4. Then it connects them together so that the communication works.

So when somebody does the DOS attack by the syn, the firewall protects and it will let the connection go in only if the tcp/ip three way handshake is completed first with the external host.

Hope that explains.

Some products to look at www.juniper.com and www.cisco.com

Both have good firewalls and you can choose the product based on your requirements.

Cheers,
Rajesh
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question