Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Technical Terms
 SYN Flood
Pages: [1]   Go Down
  Print  
Author Topic: SYN Flood  (Read 2069 times)
Khushi
Global Moderator
Adv. Member
*****



Karma: 4
Offline Offline

Posts: 329

Hello!!


View Profile
SYN Flood
« Posted: June 17, 2007, 08:58:55 PM »


SYN Flood

A SYN Flood attack is a type of denial of service attack meant to bring a network to its knees by repeatedly bombarding it with useless traffic. This network security failure begins when an attacking source generates TCP packets with random IP addresses and directs them towards the victim host. The host server replies by sending SYN ACK packets to the spoofed source addresses, which fail to respond. Hence, the host's finite-sized queue of connections waiting to be completed is filled, and before these half-open connections can time out, legitimate requests are denied. Because the IP addresses are spoofed, the source is difficult to identify. However, network security solutions to monitor traffic and limit damage are widely available.


Related terms: network security, network security solutions, network security solution providers, network security software, enterprise network security solutions, LAN security, network monitoring

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.075 seconds with 24 queries.