Realization of TCP Syn Flood Attacks using the Kali Linux

  • Dejan V. Vuletić ''Univerzitet odbrane, Institut za strategijska istrazivanja''
  • Nemanja D. Nojković
Keywords: DoS attack, Kali Linux, ping, processor utilization,

Abstract


Denial-of-Service (DoS) is a type of attack that attempts to prevent legitimate users from accessing network services. This is accomplished by overloading network services or by excessive connectivity, causing a drop in a connection or a service. DoS tools are designed to send large numbers of requests to the targeted server (usually web, FTP, e-mail server), in order to overwhelm server resources and make it unusable. There are various ways in which attackers achieve this. One of the usual ways is simply overwhelming the server by sending too many requests. This will disable the normal functioning of the server (and the web pages will open more slowly), and in some cases it can lead to a situation that the server ceases to operate. This paper shows some effects of TCP Syn Flood Attacks (using Kali Linux) through the change of processor utilization and the unavailability of the target computer (executing ping command).

Author Biography

Dejan V. Vuletić, ''Univerzitet odbrane, Institut za strategijska istrazivanja''
docent

References

Allen, L., Heriyanto, T. & Ali, S. 2014. Kali Linux – Assuring Security by Penetration Testing. Birmingham, UK: Packt Publishing, pp.14-28.

Ansari, A.J. 2015. Web Penetration Testing with Kali Linux. Birmingham, UK: Packt Publishing, p.4.

Beggs, R.W. 2014. Mastering Kali Linux for Advanced Penetration Testing. Birmingham, UK: Packt Publishing, pp.315-316.

Hertzog, R., Aharoni, M., & O'Gorman, J. 2017. Kali Linux Revealed: Mastering the Penetration Testing Distribution. Offsec Press.

Lawrence, C.M. 2012. DDoS For Dummies, Corero Network Security Edition. [e-book]. Hoboken, New Jersey: John Wiley & Sons. Available at: http://crezer.net/Newsletter/archivos/DDoS.pdf. Accessed: 10.02.2018.

-Radware. 2013. DDoS Survival Handbook. [e-book]. Radware, Ltd. Available at: https://security.radware.com/uploadedfiles/resources_and_content/ddos_handbook/ddos_handbook.pdf. Accessed: 10.02.2018.

Published
2018/06/15
Section
Professional Papers