How does a syn attack deny service

Assignment Help Computer Network Security
Reference no: EM131291310

Laboratory

PRACTICE EXAMINING TRAFFIC WITH A PROTOCOL ANALYZER

The purpose of this lab is to practice examining traffic using a protocol analyzer and recognize a SYN attack. The SYN flood attack is one of the common Denial of Service (DoS) attacks in the Internet. In the SYN flood attack, an attacker sends a large number of SYN packets to the server, ignores SYN/ACK replies and never sends the expected ACK packet. Basically, the attacker overwhelms the server with many half-established connections and exhausts the server resources, and hence the attack is known as a DoS attack.
The tool you will be using is known as Wireshark, a well-known open source packet analyzer. The exercise will demonstrate that recognizing an attack requires sophisticated tools (such as Wireshark) and knowledge of the domain (TCP/IP network).

Assignment:

1. Obtain a trace file of the TCP handshake process.

Download the attached files: "tcpshake.cap," "tcpshake.prn" (TCP: Handshake Process) and "tcp-syn-attack.cap," "tcp-syn-attack.prn," (TCP: TCP SYN Attack). The .prn file is a text file, and you can read it with Notepad or Wordpad. It contains a formatted "report" with information on each packet. The .cap file is in the proprietary Sniffer format. Opening this file produces a graphic representation of the same information. You can read .cap files with Wireshark/Ethereal, a public domain analyzer.

2. Obtain Wireshark

Follow the link to Wireshark from https://www.wireshark.org (or https://www.filehippo.com/download_wireshark/) and download the version 2.0.5 or a previous version (the current stable release of Wireshark is 2.0.5). Depending on the version, release and OS you might find the options in different places.

On the Wireshark home page, follow the link to Download. For Windows, you may download and install "wireshark-win32-2.0.5.exe." Select all installation options. (Note: These files are about 13-22MB.) On the same page you can find also the documentation (https://www.wireshark.org/download.html).

If you use a packet driver, Wireshark can both capture packets and read trace files of packets that have already been captured. However, the packet driver must access parts of your operating system that some students may not have access to. That is the reason why this is not a packet capturing exercise. However, you should learn to capture packets yourself if you can. The packet driver you will need is winpcap. It is available at https://www.winpcap.org/install/. However, you do not need winpcap for the exercise you are going to do now.

3. Read the tcpshake.cap trace file. Become familiar with Wireshark's interface.

Run Wireshark from the shortcut that is now on your desktop.

Click File|Open and uncheck all the name resolution options at the bottom of the dialog box. Type the path to tcpshake.cap, or navigate to it using the top part of the dialog box. (This interface may take a few trials to get used to.)

Explore the trace in the three panes of the analyzer. These three panes are standard to most analyzers. They are the summary pane, the protocol tree pane, and the hex pane.

Explore the preferences and configuration options in Wireshark. Share your findings with the class.
Print a packet or any part of a packet you are interested in.

4. Read the tcp-syn-attack.cap file and answer the following 10 questions:

Is this a two-way conversation?

Are there any ACK's?

How long is the data portion of each packet? Why?

Why is the sequence number zero (seq=0) in every packet?

Why do the port numbers change in every packet?

Look at the "Time" column in the summary pane. How do you interpret it?

Click the "View" menu and select "Time Display Format". "Seconds since beginning of capture" is checked. Select "Seconds since Previous Captured Packet". How frequently are these packets being sent?

Where in the protocol tree pane would you find the protocol "Type" field?

Look in the flags section of the transport layer (Transmission Control Protocol" in the protocol tree section for one of the packets. What flags are set?

How does a SYN attack deny service?

 

980_20161114_133426.jpg

Reference no: EM131291310

Questions Cloud

Critical thinking questions : Answer the following Critical Thinking Questions (in your own words and at least one paragraph unless otherwise specified). Use the Internet, your textbook and other applicable resources:
Convert fixed-rate debt to floatingrate debt : Also, identify and compare an alternative method that can be used to convert fixed-rate debt to floatingrate debt
What happens assuming two subsequent future possibilities : To provide a better matching of the interestsensitivities of your assets and liabilities, you want to lengthen the duration of the bonds. How could you use swaptions to restructure the debt? Explain what happens assuming two subsequent future poss..
Social networks of that organization : Think of an organization that you are familiar with and the social networks of that organization. Using information from the Li and Hung article as well as your understanding of FRLD
How does a syn attack deny service : How long is the data portion of each packet? Why?Why is the sequence number zero (seq=0) in every packet?Why do the port numbers change in every packet?
Determine the payoff value of the swaption : Assume 360 days in a year. Determine the payoff value of the swaption
Determine your current portfolio delta gamma : As described above, you have three instruments currently in your portfolio. Determine your current portfolio delta, gamma, and vega. Describe in words the risk properties of your portfolio based on your calculations.
Undoubtedly aware of the progress to normalize : You have undoubtedly aware of the progress to normalize trade and travel relations with Cuba, and the resumption of diplomatic relations and the opening of respective embassies of the two countries.
What other forms of market risk might remain : If a portfolio of derivatives is delta hedged by adding a position in Eurodollar futures, what other forms of market risk might remain? How can these risks be eliminated?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Functions of the transport and network layers

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space? How has/will IPv6 impact organizations, the Internet, and you at home?

  Provide the ip address of the host used by the perpetrator

Provide the IP address of the host used by the perpetrator. Based on this information, what can you tell about the profile of this individual? Explain why.

  You are a senior network engineer at a technology firm

you are a senior network engineer at a technology firm. your company has 500 employees. your ceo meets with you and

  Information and communication technology infrastructure

In this Group Project, assume that you and the members of your group are top managers of a big international company spread over several continents. You decide to rebuild/expand your company's Information and Communication Technology infrastructur..

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  Discusses the possible role of encryption

Write a 5-6-page research paper that discusses the possible role of encryption in preventing the breach described in the scenario. You may take either a pro or con position.

  Write a ten page report for the cio of kudler fine foods

Write an 8-to 10-page report for the CIO of Kudler Fine Foods. The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

  Explain the benefits of the proposed network solution

Explain the benefits of the proposed network solution. Identify the risks and risk mitigation strategies associated with the proposed network solution.

  Assignment on software vulnerability

Assignment on Software Vulnerability - Software vulnerabilities, especially vulnerabilities in code, are a major security problem today - Investigate two vulnerabilities of your choice from these two lists or any other reputable source

  What are the pros and cons of each method

What are the pros and cons of each method? If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?

  Create list of security issues which the firm must monitor

You decide to create security checklist for New Century. Create list of security issues which the firm must evaluate and monitor. Make sure to organize items into categories which match five security levels.

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd