Solved

DOS attack

Posted on 2006-11-23
1
367 Views
Last Modified: 2012-05-05
What techniques are used to secure against DOS attacks, i.e. someone killing the signal over WI-FI?
0
Comment
Question by:pma111
1 Comment
 
LVL 32

Accepted Solution

by:
rsivanandan earned 125 total points
ID: 18002762
A stateful firewall which does proxy service would help you protect from the dos attacks.

In a denial of service attack, remote host(s) keep send the syn packet which basically is flooded a machine (usually a webserver kinda) and when its tcp/ip buffer runs over it breaks down.

So when you put in a firewall, what it does is it takes the hit on the firewall and saves the internal machines from doing it.

How it does?
1. An external host sends a syn packet.
2. Firewall responds with a syn+ack to the external host (at this point, the internal server doesn't even know that there is something going on like this).
3. If the external hosts sends an ack packet, then the firewall creates a new session by syn to ack to the internal server.
4. Then it connects them together so that the communication works.

So when somebody does the DOS attack by the syn, the firewall protects and it will let the connection go in only if the tcp/ip three way handshake is completed first with the external host.

Hope that explains.

Some products to look at www.juniper.com and www.cisco.com

Both have good firewalls and you can choose the product based on your requirements.

Cheers,
Rajesh
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question