DoS (Denial of Service) attacks against Web
services make them unavailable for legitimate users, affecting the
website owner’s potential business. These involve intentional
consumption of network, CPU and memory resources. In this article, I
will demonstrate how to do a SYN flood using the SCAPY framework, along
with other preventive measures.
Over time, DoS attacks have become more complicated, concealing
malicious client requests as legitimate ones. Also, a distributed
approach, the DDoS (Distributed Denial of Service) is now being adopted,
which involves generating multiple requests to create a flood scenario.
One type of DDoS flood attack is the TCP SYN queue flood.A SYN queue flood attack takes advantage of the TCP protocol’s “three-way handshake”. A client sends a TCP SYN (S flag) packet to begin a connection to the server. The target server replies with a TCP SYN-ACK (SA flag) packet, but the client does not respond to the SYN-ACK, leaving the TCP connection “half-open”. In normal operation, the client should send an ACK (a flag) packet followed by the data to be transferred, or an RST reply to reset the connection. On the target server, the connection is kept open, in a “SYN_RECV” state, as the ACK packet may have been lost due to network problems.