Solved

DOS attack

Posted on 2006-11-23
1
369 Views
Last Modified: 2012-05-05
What techniques are used to secure against DOS attacks, i.e. someone killing the signal over WI-FI?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 32

Accepted Solution

by:
rsivanandan earned 125 total points
ID: 18002762
A stateful firewall which does proxy service would help you protect from the dos attacks.

In a denial of service attack, remote host(s) keep send the syn packet which basically is flooded a machine (usually a webserver kinda) and when its tcp/ip buffer runs over it breaks down.

So when you put in a firewall, what it does is it takes the hit on the firewall and saves the internal machines from doing it.

How it does?
1. An external host sends a syn packet.
2. Firewall responds with a syn+ack to the external host (at this point, the internal server doesn't even know that there is something going on like this).
3. If the external hosts sends an ack packet, then the firewall creates a new session by syn to ack to the internal server.
4. Then it connects them together so that the communication works.

So when somebody does the DOS attack by the syn, the firewall protects and it will let the connection go in only if the tcp/ip three way handshake is completed first with the external host.

Hope that explains.

Some products to look at www.juniper.com and www.cisco.com

Both have good firewalls and you can choose the product based on your requirements.

Cheers,
Rajesh
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Home Folder Permissions in Active Directory 2 47
SCSM reports export 1 52
Exchange in house vs office 365 for security 6 46
O365 and Multi Factor Authentication 1 42
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question