GRT-504 4-Wire G.SHDSL.bis Firewall Router User’s Manual
Hacker 's
System
Target
System
Internet
TCP SYN
requests
Backing
quene
TCP SYN-ACK
Packets
ICMP Flood-
The attacker transmits a volume of ICMP request packets to cause all CPU
resources to be consumed serving the phony requests.
UDP Flood-
The attacker transmits a volume of requests for UDP diagnostic services, which
cause all CPU resources to be consumed serving the phony requests.
Land attack-
The attacker attempts to slow your network down by sending a packet with identical
source and destination addresses originating from your network.
IP Spoofing-
IP Spoofing is a method of masking the identity of an intrusion by making it appeared
that the traffic came from a different computer. This is used by intruders to keep their anonymity
and can be used in a Denial of Service attack.
Smurf attack-
The source address of the intended victim is forged in a broadcast ping so that a
huge number of ICMP echo reply back to victim indicated by the address, overloading it.
Hacker 's
System
Multiple network
Subnet
Internet
Broadcast ping
request from spoofed
IP address
Target Router
Ping response
Fraggle Attack-
A perpetrator sends a large amount of UDP echo packets at IP broadcast
addresses, all of it having a fake source address.
20
Summary of Contents for G.SHDSL.bis Bridge Router GRT-504
Page 1: ...4 Wire G SHDSL bis Firewall Router GRT 504 User s Manual...
Page 12: ...GRT 504 4 Wire G SHDSL bis Firewall Router User s Manual 1 3 Applications 11...
Page 24: ...GRT 504 4 Wire G SHDSL bis Firewall Router User s Manual 23...
Page 25: ...GRT 504 4 Wire G SHDSL bis Firewall Router User s Manual 24...