Title of article :
Realization of a TCP Syn Flood Attack using Kali Linux
Author/Authors :
Vuletic ، D.V. Strategic Research Institute - University of Defence in Belgrade , Nojkovic ، N.D. Department for Telecommunication and Informatics (Ј-6), Command Information Systems and IT Support Centre - General Staff - Serbian Armed Forces
From page :
640
To page :
649
Abstract :
Denial-of-Service (DoS) is a type of attack that attempts to prevent legitimate users from accessing network services. This is accomplished by overloading network services or by excessive connectivity, causing a drop in a connection or a service. DoS tools are designed to send large numbers of requests to the targeted server (usually web, FTP, e-mail server), in order to overwhelm server resources and make it unusable. There are various ways in which attackers achieve this. One of the usual ways is simply overwhelming the server by sending too many requests. This will disable the normal functioning of the server (and the web pages will open more slowly), and in some cases it can lead to a situation that the server ceases to operate. This paper shows some effects of TCP Syn Flood Attacks (using Kali Linux) through the change of processor utilization and the unavailability of the target computer (executing ping command).
Keywords :
DoS attack , Kali Linux , ping , processor utilization ,
Journal title :
Military Technical Courier
Journal title :
Military Technical Courier
Record number :
2509050
Link To Document :
بازگشت