SYN Flood Attack
SYN Flood Attack
How it Works (The TCP Handshake & Attack)
-
- Normal TCP Handshake:
- Client sends a SYN (synchronize) packet to the server.
- Server replies with a SYN-ACK (synchronize-acknowledge) packet.
- Client sends an
ACK(acknowledgment) packet, completing the connection.
- Normal TCP Handshake:
- SYN Flood Attack:
- Attacker sends a flood of SYN packets, often with spoofed (fake) source IP addresses.
- The server responds with SYN-ACK for each, but since the source IP is fake, the final ACK never arrives.
- The server keeps these “half-open” connections waiting, consuming memory and port resources.
- Eventually, all available connection resources are used up, blocking legitimate users from connecting.
Key Characteristics & Impact
- Resource Exhaustion: Ties up server memory, CPU, and connection tables.
- Service Disruption: Makes web servers, email servers, and other TCP-based services unavailable.
- Difficulty in Tracing: Spoofed IPs make it harder to find the real attacker.
- “Half-Open Attack”: A common name due to the incomplete connections left open.
Mitigation Techniques
Some of the mitigation techniques are as follows:
- SYN Cookies: A method to verify connections without storing state for half-open connections.
- Firewalls & Intrusion Prevention Systems (IPS): Can detect and block suspicious SYN traffic.
- Rate Limiting: Restricting the number of connection requests from a single source.
- DDoS Protection Services: Cloud-based solutions that absorb and filter attack traffic.