当前位置:网站首页>What does ack attack mean? How to defend ack attack
What does ack attack mean? How to defend ack attack
2022-07-19 07:02:00 【V13807970340】
ACK Flood The attack was TCP After the connection is established , All the transmitted TCP All messages have ACK Flag bit packets .
The receiving end receives a message with ACK Flag bit of the packet when , You need to check if the connection quadruple represented by the packet exists , If it exists, check whether the state represented by the packet is legal , Then pass the packet to the application layer .
If the data packet is found to be illegal during the inspection , If the destination port pointed to is not open , Then the operating system protocol stack will respond RST The packet tells the other party that the port does not exist .
When an attacker sends... Every second ACK The message rate reaches a certain level , In order to make the load of the host and firewall change greatly . When the contracting rate is very high , The host operating system will spend a lot of energy receiving messages 、 Judge the state , At the same time, take the initiative to respond RST message , Normal packets may not be processed in time . At this point, the client ( With IE For example ) The performance is that the response to visiting the page is very slow , High packet loss rate . This is it. ACK attack .
At this point, the server needs to do two actions , Table lookup and response ack/rst.
This type of attack does not syn flood The impact on the server is great ( because syn flood Occupied connection ), Such attacks must use large traffic ack Small packet impact will affect the server .
according to tcp Protocol stack principle , Random source IP Of ack The packet should be server Quickly discarded , Because on the server tcp These are not in the stack ack Status information of the package .
In the actual test, some tcp The service is right ack flood Is more sensitive .
about Apache perhaps IIS Come on , Dozens of kpps Of ack flood Not a threat , But a higher number ack flood The impact will cause the network card to interrupt too frequently and stop responding when the load is too heavy .
jsp server In a small number of ack Under the impact of small bags jsp server It is difficult to handle normal connection requests .
therefore ack flood Not only harm routers and other network equipment , And it also has a great impact on the application on the server .
Attack harms
attacker Use botnets to send a large number of ack message , Can cause the following three hazards :
1、 With a very large load ack flood attack , It will lead to link congestion .
2、 The attack packets arrive at the server and cause the processing performance to be exhausted , Thus refusing normal service .
3、 Very high rate variable source variable port ack flood attack , It is easy to cause the forwarding performance of devices that rely on session forwarding to degrade or even cause network paralysis .
defense
Now most defense means rely on hard defense , What is hard defense ? The size of the firewall and the exit of the computer room determines the strength of the defense ability and the operation and maintenance ability , If you encounter problems, do you react immediately and make strategies . Attack methods are always strange. At this time, it is a great test of the professional ability and experience of operation and maintenance personnel
边栏推荐
- 1.服务器是什么?
- PyTorch学习日记(四)
- Performance test and price comparison of cloud servers of Alibaba cloud, Tencent cloud, Huawei cloud, ucloud and Tianyi cloud
- 部署zabbix-agaent2与验证
- 华为云 鲲鹏ARM云服务器 和 x86云服务器 性能评测对比
- [automated testing] - robotframework practice (II) new test cases
- IP fragment是什么意思?如何防御IP fragment攻击?
- 网站被劫持了怎么办?
- [CS Genesis] comparative analysis of advantages and disadvantages of SD NAND and raw NAND
- 渊子赛马。
猜你喜欢
Xiaodi network security notes - Information Collection - architecture, construction, WAF (8)

PyTorch学习日记(四)

Xiaodi network security - Notes (5)

Xiaodi network security - Notes (3)
![[automated testing] - robotframework practice (I) building environment](/img/3e/4aa4ef8e64efa81bb168ab5aff666e.png)
[automated testing] - robotframework practice (I) building environment

传奇游戏架设教程

STEAM游戏高主频i9-12900k 搭建CS:GO服务器

Filter过滤器
![[automated testing] - robotframework practice (II) new test cases](/img/e8/b5e945400445c66e3a7a129744c21d.png)
[automated testing] - robotframework practice (II) new test cases

华为云 鲲鹏ARM云服务器 和 x86云服务器 性能评测对比
随机推荐
SSH remote login service
Xiaodi network security - Notes (3)
cookie、session的配置和使用
PyTorch学习日记(四)
ArraysList方法
Application case of CS brand SD NAND in air quality inspection industry
Gentoo安装教程(Systemd+Gnome)
中国知网论文free下载的方法
m在VBLAST协作MIMO系统分部使用LDPC,Turbo,卷积三种信道编译码进行误码率matlab仿真
传奇手游怎么开服?需要投资多少?需要那些东西?
Ucloud Shanghai arm cloud server evaluation
Homework
快速学会cut命令,uniq命令的使用
类与对象
Évaluation des performances de la machine virtuelle Tianyi Cloud Hangzhou (VPS)
递归访问目录,打印斐波那契数列,高阶函数
文本三剑客之awk命令--截取
寄居蟹和海葵
103.53.124.X IP段BGP线路和普通的专线有什么区别
Yuanzi racehorse.