13
T
YPES OF
A
TTACK AND
F
IREWALL
D
EFENCES
This chapter describes the some of attacks that hackers may use to
infiltrate and attack your network. It also details the way in which the
Firewall will counter the attacks. The following sections are covered in this
chapter:
■
Denial of Service Attacks
■
Intrusion Attacks
■
Trojan Horse Attacks
Denial of Service
Attacks
Denial of Service (DoS) attacks are malicious attacks designed to cause
harm. The consequences of an attack range from the loss of few seconds
of time on a web server or network to the crash of a server. In the worst
case the attacker can learn enough about your company infrastructure
and exploit its vulnerabilities to crash any server at will.
Denial of Service attacks work by exploiting weaknesses in TCP/IP,
exploiting weaknesses in your servers or by generating large amounts of
traffic (brute force attacks). Commonly attempted attacks and the
reaction of the SuperStack
®
3 Firewall are listed below.
Ping of Death
A
ping of death
attack attempts to crash your system by sending a
fragmented packet which, when reconstructed is larger than the
maximum allowable size. Other known variants of the
ping of death
include
teardrop
,
bonk
and
nestea.
Firewall Response:
Packet is dropped. Attack is stopped.
Smurf Attack
A
smurf attack
involves two systems. The attacker sends a packet
containing a ICMP echo request (ping) to the network address of one
system. This system is known as the amplifier.
DUA1611-0AAA02.book Page 175 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...