Question: In a TCP SYN spoofing attack, the attacker seeks to exhaust a server's connection request table, preventing it from responding to legitimate connection requests. Here
In a TCP SYN spoofing attack, the attacker seeks to exhaust a server's connection request table, preventing it from responding to legitimate connection requests. Here are the details of this scenario:
i Server Configuration: The server has a table that can hold up to TCP connection requests.
ii Retry and Timeout Mechanism:
If the server does not receive an ACK in response to its SYNACK, it retries the SYNACK five times, with each retry occurring at second intervals.
After five retries without an ACK, the server purges the request, meaning each connection request remains in the table for:
seconds seconds minutes
iii. Attack Assumptions: No countermeasures are in place against this attack, and the attacker has initially filled the connection request table completely.
Problem Statement:
Attack Rate Requirement:
At what rate in requests per minute must the attacker continue sending TCP connection requests to keep the table full?
Mark
Bandwidth Consumption:
Assuming each TCP SYN packet is bytes in size, what is the bandwidth consumed by the attacker in bits per second? Mark
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
