BSDCon 2002 Abstract
Resisting SYN flood DoS attacks with a SYN cache
Jonathan Lemon, FreeBSD Project
Abstract
Machines that provide TCP services are often susceptible to various
types of Denial of Service attacks from external hosts on the network.
One particular type of attack is known as a SYN flood, where external
hosts attempt to overwhelm the server machine by sending a constant stream
of TCP connection requests, forcing the server to allocate resources
for each new connection until all resources are exhausted. This paper
discusses several approaches for dealing with the exhaustion problem,
including SYN caches and SYN cookies. The advantages and drawbacks of
each approach are presented, and the implementation of the specific
solution used in FreeBSD is analyzed.
- View the full text of this paper in
HTML,
PDF, and
PostScript. Until February 2003, you will need your USENIX membership identification in order to access the full papers.
The Proceedings are published as a collective work, © 2002 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
- To become a USENIX Member, please see our Membership Information.
|