当前位置:网站首页>Connection flood attack principle
Connection flood attack principle
2022-06-30 07:03:00 【IDC02_ FEIYA】
Connection Flood Attack principle
Connection Flood(TCP Multi connection attack ,CC Attacks and other types of attacks that cause denial of service by establishing a large number of connection requests ) It is a typical and very effective attack method that uses small traffic to impact large bandwidth network services , This kind of attack has become more and more rampant .
The principle of this attack is to use real IP Address initiates a large number of connections to the server , And it will not be released for a long time after the connection is established , Take up the resources of the server , Cause residual connections on the server (WAIT state ) Too much , Low efficiency , Even resource depletion , Unable to respond to connections initiated by other customers .
One attack method is to send a large number of connection requests to the server every second , This is similar to a fixed source IP Of SYN Flood attack , The difference is that the real source IP Address . Usually this limits each source on the firewall IP Address the number of connections per second to achieve the purpose of protection . But now there are tools that use slow connections , That is, it takes a few seconds to establish a connection with the server , After the connection is established successfully, it will not release and send garbage packets to the server regularly, so that the connection can be maintained for a long time . Such a IP Address can establish hundreds of connections with the server , The number of connections that the server can tolerate is limited , This achieves the effect of denial of service .
in addition , When worms erupt on a large scale , The worm code is relatively simple , There will be a large number of sources in the process of propagation IP Packets with the same address , about TCP Worms behave as large-scale scanning . This is judging Connection Flood You need to pay attention to .
Use... On the attacked server netstat –an Look at :

There are a lot of connection states , From a few sources . If the statistics , You can see that the number of connections is abnormal compared with the usual number . And it starts to fluctuate when it reaches a certain value , It indicates that the performance limit may be approached at this time . therefore , The judgment of this attack : It is not reflected in the flow , It may even be small ; a large number of ESTABLISH state ; New ESTABLISH The total number of states fluctuates .
Connection Flood protective
1、 Active removal of residual connections .
2、 For malicious connections IP To ban .
3、 Limit each source IP Connection number .
4、 It can be used for specific URL Protection .
5、 The check Proxy Initiated later Http Get Flood Source .
边栏推荐
- First line of code (Third Edition) learning notes
- 【最全】linux服务器上安装Mysql
- 如果我在珠海,到哪里开户比较好?另外,手机开户安全么?
- RT thread migration to s5p4418 (IV): thread synchronization
- 免实名域名是什么意思?
- Porting RT thread to s5p4418 (V): thread communication
- Keil - the "trace HW not present" appears during download debugging
- RT thread Kernel Implementation (VI): time slice
- Imxq Freescale yocto project compilation record
- Running lantern effect JS text rotation effect realization
猜你喜欢

编写并运行第一个Go语言程序

【最全】linux服务器上安装Mysql
![[fuzzy neural network] mobile robot path planning based on Fuzzy Neural Network](/img/39/c9bf235828b6d50e7931876fa4a918.png)
[fuzzy neural network] mobile robot path planning based on Fuzzy Neural Network

Win10踩坑-开机0xc0000225

Google Earth Engine(GEE)——墨累全球潮汐湿地变化 v1 (1999-2019) 数据集

It turns out that you are such an array. You have finally learned

tomorrow! "Mobile cloud Cup" competition air publicity will start!
![[transfer] analysis of memory structure, cache and DMA architecture](/img/c1/6a872babf9b5236d226de455a49b8b.png)
[transfer] analysis of memory structure, cache and DMA architecture

SOC_ SD_ CLK

Out of class implementation of member function of class template
随机推荐
Unity中实现溶解(Dissolve)特效及其原理解析
RT thread migration to s5p4418 (IV): thread synchronization
Browser downloads files as attachments
SOC_ SD_ CLK
How does the CPU recognize the code?
2022年6月29日--使用C#迈出第一步--使用 C# 中的“if”、“else”和“else if”语句向代码添加决策逻辑
对占用多字节和位的报文信号解析详解
Record one time of Tencent Test Development Engineer's automation interface test practice experience
Record common problems: spaces in encodeuricomponent decoding and the use of Schema in third-party apps to invoke apps
踩坑记录:supervisor 日志返回信息:redis扩展未安装
Win10 step pit - power on 0xc0000225
ROS program compilation, like no compilation, refers to the execution of the old compiled executable program
Solr search
The solution of memcpy memory overlap
RT thread Kernel Implementation (V): timer
元宇宙由哪些底层技术支撑?
RT thread Kernel Implementation (III): implementation of idle threads and blocking delay
第一行代码(第三版)学习笔记
【docsify基本使用】
Installation du serveur linux redis