Intrusion
|
Description
|
---|---|
A Denial of Service attack where a hacker directs an
oversized TCP/UDP packet at a target endpoint. This can cause a
buffer overflow, which can freeze or restart the endpoint.
|
|
A Denial of Service attack where a hacker directs an
oversized ICMP/ICMPv6 packet at a target endpoint. This can cause a
buffer overflow, which can freeze or reboot the endpoint.
|
|
A type of attack where a hacker sends an Address
Resolution Protocol (ARP) request with the same source and
destination IP address to a targeted endpoint. The target endpoint
continually sends an ARP response (its MAC address) to itself,
causing the endpoint to freeze or crash.
|
|
A Denial of Service attack where a program sends multiple
TCP synchronization (SYN) packets to the endpoint, causing the
endpoint to continually send synchronization acknowledgment
(SYN/ACK) responses. This can exhaust endpoint memory and eventually
crash the endpoint.
|
|
Similar to a Teardrop attack, this Denial of Service
attack sends overlapping TCP fragments to the endpoint. This
overwrites the header information in the first TCP fragment and may
pass through a firewall. The firewall may then allow subsequent
fragments with malicious code to pass through to the target
endpoint.
|
|
Similar to an overlapping fragment attack, this Denial
of Service attack deals with IP fragments. A confusing offset value
in the second or later IP fragment can cause the operating system on
the receiving endpoint to crash when attempting to reassemble the
fragments.
|
|
A type of attack where a small TCP fragment size forces the first TCP
packet header information into the next fragment. This can cause
routers that filter traffic to ignore the subsequent fragments,
which may contain malicious data.
|
|
A Denial of Service attack that sends fragmented IGMP
packets to a target endpoint, which cannot properly process the IGMP
packets. This can freeze or slow down the endpoint.
|
|
A type of attack that sends IP synchronization (SYN)
packets with the same source and destination address to the
endpoint, causing the endpoint to send the synchronization
acknowledgment (SYN/ACK) response to itself. This can freeze or slow
down the endpoint.
|