Table 60: Attack Counters
Description
Item
Name of the interface.
Interface
SYN packets overwhelm a network by initiating so many connection attempts
or information requests that the network can no longer process legitimate
connection requests, resulting in a Denial of Service.
SYN Attack
When the first and second parts of a fragmented packet overlap, the server
attempting to reassemble the packet can crash. If the security device sees
this discrepancy in a fragmented packet, it drops the packet.
Tear Drop
This option applies in an IP header and allows an attacker to enter a network
with a false IP address and have data sent back to the attacker’s real address.
Source Route
Intentionally oversized or irregular ICMP packets can trigger a Denial of
Service condition, freezing, or other adverse system reactions. You can
configure a security device to detect and reject oversized or irregular packet
sizes.
Ping of Death
You can enable a security device to guard against spoofing attacks by
checking its own route table. If the IP address is not in the route table, traffic
through the security device is not allowed.
Address Spoofing
Combining a SYN attack with IP spoofing, a Land attack occurs when an
attacker sends spoofed SYN packets containing the IP address of the victim
as both the destination and source IP address. This creates an empty
connection. Flooding a system with such empty connections can overwhelm
the system, causing a Denial of Service. Security devices automatically block
any attempt of this nature and records such attempts as a Land attack.
Land Attack
ICMP pings can overload a system with so many echo requests that the
system expends all its resources responding until it can no longer process
valid network traffic. If you set a threshold to invoke ICMP flood attack
protection when exceeded, ICMP flood attacks are recorded as statistics.
ICMP Flood
Similar to the ICMP flood, UDP flooding occurs when UDP packets are sent
with the purpose of slowing down the system to the point that it can no
longer handle valid connections. After enabling the UDP flood protection
feature, you can set a threshold that once exceeded invokes the UDP flood
attack protection feature. (The default threshold value is 1000 packets per
second.) If the threshold is exceeded, the security device ignores further UDP
packets for the remainder of that second.
UDP Flood
WinNuke can cause any computer on the Internet running Windows to crash.
WinNuke introduces a NetBIOS anomaly that forces Windows to restart.
Security devices can scan any incoming Microsoft NetBIOS Session Service
packets, modify them, and record the event as a WinNuke attack.
WinNuke
Copyright © 2010, Juniper Networks, Inc.
678
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...