Question : syn flood attack

Hi there, can anybody interpret the following line for me? I understand it has to do with a syn flood attack to my server, but I want to know more about it.

/02/2005  14:44:30 **SYN Flood to Host** 192.168.2.105, 3230->> 207.44.208.7, 80 (from PPPoE Outbound)

I would also like to know if its possible to know from this info if the router is blocking the attack or not
tnx

Answer : syn flood attack

Hi,

"192.168.2.105, 3230"

IP Address of local device where the SYN Flood Host is happening 3230 is the port number used.

Port 3230:
Polycom ViaVideo H.323 (3230-3235) (TCP/UDP)

"207.44.208.7, 80"

This is a public IP Address that is using port 80 --->  HTTP (TCP/UDP)

The IP Address belongs to mail.todomexico.com ---> Do you know who this is?

A SYN flood is a type of DoS (Denial of Service) attack.

When you establish a TCP connection a three-way hand shake is performed,
the originator sends a SYN, the receiver sends a SYN-ACK, and then there
is another ACK in response to acknowledge the SYN-ACK (if I remember
correctly).

The attack works by sending lots of SYNs to the remote host without doing
any ACK, the remote host has to wait a period of time for the ACK before
giving up and discarding the SYN. So, if you send lots of SYNs you can
fill out the resource table/buffers of the receiving host until it can't
accept any more connections. I expect because the connection is never
completed you can easy forge and randomise the source of the SYNs as well.

I suspect you made a lot of genuine connections, but maybe a high number
in a short time frame so your router is flagging a high rate of SYNs in
genuine TCP connections.

> How can I rectify the NTP time thing?

Router probably needs the IP address of an NTP time server that it
can sync with, see if your ISP provides one, or check out the list at
www.ntp.org for a stratum 2 time server that you can use.
Random Solutions  
 
programming4us programming4us