Realization of a TCP Syn Flood Attack using Kali Linux
Journal: VOJNOTEHNICKI GLASNIK / MILITARY TECHNICAL COURIER (Vol.66, No. 3)Publication Date: 2018-07-01
Authors : Dejan V. Vuletić; Nemanja D. Nojković;
Page : 640-649
Keywords : DoS attack; Kali Linux; ping; processor utilization;
Abstract
Denial-of-Service (DoS) is a type of attack that attempts to prevent legitimate users from accessing network services. This is accomplished by overloading network services or by excessive connectivity, causing a drop in a connection or a service. DoS tools are designed to send large numbers of requests to the targeted server (usually web, FTP, e-mail server), in order to overwhelm server resources and make it unusable. There are various ways in which attackers achieve this. One of the usual ways is simply overwhelming the server by sending too many requests. This will disable the normal functioning of the server (and the web pages will open more slowly), and in some cases it can lead to a situation that the server ceases to operate. This paper shows some effects of TCP Syn Flood Attacks (using Kali Linux) through the change of processor utilization and the unavailability of the target computer (executing ping command).
Other Latest Articles
- Testing the performance of NoSQL databases via the database benchmark tool
- Serious games in military applications
- Review of KDD Cup '99, NSL-KDD and Kyoto 2006+ datasets
- On some known fixed point results in the complex domain: Survey
- Characterization of the vacuum plasma sprayed VPS-Ti/TiC composite coating
Last modified: 2018-06-28 01:26:50