which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections.The signature for SYN Flood attack is:

SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections.

The signature for SYN Flood attack is:

SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections.

The signature for SYN Flood attack is:

A.
The source and destination address having the same value.

B.
The source and destination port numbers having the same value.

C.
A large number of SYN packets appearing on a network without the corresponding reply packets.

D.
A large number of SYN packets appearing on a network with the corresponding reply packets.

Explanation:
A SYN attack occurs when an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake. The attacker floods the target system’s small "in-process" queue with connection requests, but it does not respond when a target system replies to those requests. This causes the target system to time out while waiting for the proper response, which makes the system crash or become unusable.



Leave a Reply 0

Your email address will not be published. Required fields are marked *