当前位置:网站首页>Connection flood attack principle
Connection flood attack principle
2022-06-30 07:03:00 【IDC02_ FEIYA】
Connection Flood Attack principle
Connection Flood(TCP Multi connection attack ,CC Attacks and other types of attacks that cause denial of service by establishing a large number of connection requests ) It is a typical and very effective attack method that uses small traffic to impact large bandwidth network services , This kind of attack has become more and more rampant .
The principle of this attack is to use real IP Address initiates a large number of connections to the server , And it will not be released for a long time after the connection is established , Take up the resources of the server , Cause residual connections on the server (WAIT state ) Too much , Low efficiency , Even resource depletion , Unable to respond to connections initiated by other customers .
One attack method is to send a large number of connection requests to the server every second , This is similar to a fixed source IP Of SYN Flood attack , The difference is that the real source IP Address . Usually this limits each source on the firewall IP Address the number of connections per second to achieve the purpose of protection . But now there are tools that use slow connections , That is, it takes a few seconds to establish a connection with the server , After the connection is established successfully, it will not release and send garbage packets to the server regularly, so that the connection can be maintained for a long time . Such a IP Address can establish hundreds of connections with the server , The number of connections that the server can tolerate is limited , This achieves the effect of denial of service .
in addition , When worms erupt on a large scale , The worm code is relatively simple , There will be a large number of sources in the process of propagation IP Packets with the same address , about TCP Worms behave as large-scale scanning . This is judging Connection Flood You need to pay attention to .
Use... On the attacked server netstat –an Look at :

There are a lot of connection states , From a few sources . If the statistics , You can see that the number of connections is abnormal compared with the usual number . And it starts to fluctuate when it reaches a certain value , It indicates that the performance limit may be approached at this time . therefore , The judgment of this attack : It is not reflected in the flow , It may even be small ; a large number of ESTABLISH state ; New ESTABLISH The total number of states fluctuates .
Connection Flood protective
1、 Active removal of residual connections .
2、 For malicious connections IP To ban .
3、 Limit each source IP Connection number .
4、 It can be used for specific URL Protection .
5、 The check Proxy Initiated later Http Get Flood Source .
边栏推荐
- Base64 encoding method implemented by native JS
- 经纬恒润再次荣获PACCAR集团 10PPM 质量奖
- How to convert XML to JSON
- RT thread Kernel Implementation (IV): multi priority
- Google Earth engine (GEE) - Murray global tidal wetland change V1 (1999-2019) data set
- Egret P2 pit encountered by physical engine (1)
- 已解决:initialize specified but the data directory has files in it. Aborting
- Ls1028 manual
- 【SemiDrive源码分析】【X9芯片启动流程】33 - Display模块 相关概念解析
- app闪退
猜你喜欢

Go installation and configuration (1)

IDEA import导入的类明明存在,却飘红?

【Mask-RCNN】基于Mask-RCNN的目标检测和识别

SOC_ SD_ CLK

Porting RT thread to s5p4418 (II): dynamic memory management

Go常用命令

SQL Server2005中SUM函数内嵌套IF语句

Relevant database questions.

Out of class implementation of member function of class template

Win10 step pit - power on 0xc0000225
随机推荐
If I am in Zhuhai, where can I open an account? In addition, is it safe to open a mobile account?
15 minutes learn to use JWT
Definition and use of ROS topic messages
【Hot100】11. Container with the most water
Unity中实现溶解(Dissolve)特效及其原理解析
【最全】linux服务器上安装Mysql
1285_把AUTOSAR函数以及变量等定义的宏用脚本展开以提高可读性
Out of class implementation of member function of class template
Four great happenings on earth
SQL Server2005中SUM函数内嵌套IF语句
Vscode returns the previous cursor (previous browse position)
Connection Flood攻击原理
RT thread migration to s5p4418 (IV): thread synchronization
Google Earth engine (GEE) - Murray global tidal wetland change V1 (1999-2019) data set
Cluster distributed
【json-tutorial】第一章学习笔记
It turns out that you are such an array. You have finally learned
Running lantern effect JS text rotation effect realization
Rising posture series: fancy debugging information
QT signal slot alarm QObject:: connect:cannot connect (null)