Security.com

SYN flood attack

By Ben Lutkevich

What is a SYN flood attack?

A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a half-open attack.

SYN floods are one of several common vulnerabilities that take advantage of TCP/IP to overwhelm target systems. SYN flood attacks use a process known as the TCP three-way handshake. As part of the handshake, the client and server exchange messages to establish a communication channel.

The attack involves having a client repeatedly send SYN -- which stands for synchronization -- packets to every port on a server using fake IP addresses. When an attack begins, the targeted server sees the equivalent of multiple attempts to establish communications. It sends a SYN-ACK -- or synchronization acknowledged -- packet from all of the open ports in response to each communication attempt and a RST -- or reset -- packet from all of the closed ports.

SYN flood explained: How it exploits the three-way handshake

A three-way handshake involves the following three steps:

  1. The client sends a SYN packet to initiate communication with the server.
  2. The server responds, sending a SYN-ACK packet.
  3. The client returns a final ACK packet to confirm that the server's SYN-ACK packet was received.

Once those three steps happen, communication can begin between the client and the server. However, in a SYN flood, the hostile client does not return an ACK response packet. Instead, the client program sends repeated SYN requests to all the server's ports. A hostile client knows a port is open when the server responds with a SYN-ACK packet.

The hostile client's SYN requests appear valid to the server. However, because the attacker uses fake IP addresses, the server is unable to close the connection by sending RST packets to the client.

As a result, the connection stays open, and before a timeout can occur, another SYN packet arrives from the hostile client. This is called a half-open connection. The server becomes so busy with the hostile client requests that communication with legitimate traffic is difficult or impossible.

How can a SYN flood attack occur?

The three ways that a SYN flood attack can occur are the following:

How is a SYN flood attack mitigated?

There are several ways to mitigate SYN flood attacks, including the following techniques:

Each of these methods has advantages and disadvantages. The best way for an organization to mitigate a TCP SYN flood attack is to configure its systems in a way that aligns with its network security policy and infrastructure.

Why is SYN flood prevention important?

SYN flood prevention is important because these attacks can cause significant damage to networks and systems. SYN floods can cripple servers and networks, making them unavailable to legitimate users. They can also cause data loss and other damage.

High-profile cyber attacks, such as the Mirai botnet, use SYN flooding to crash servers and inflict damage. Internet of things devices are particularly prone to SYN flooding and DDoS attacks.

Is SYN flooding illegal?

Although threat actors often use this technique, SYN flooding is not always illegal. Security professionals and ethical hackers use SYN flooding as a legitimate way to test or debug a network. The practice of intentionally exploiting a computer system or network to discover and fix flaws is known as penetration testing.

However, when SYN flooding is used to harm another computer system, it is illegal. These attackers may be subject to civil penalties or fines. A DDoS attack that uses SYN flooding is an illegal cybercrime in the U.S. Depending on the context, it could be considered a federal offense under the Computer Fraud and Abuse Act.

Providing DDoS protection and deflecting botnets, SYN floods and other exploits require a solid enterprise cybersecurity plan. As part of such a plan, employees must be properly trained. Learn what type of relevant and effective cybersecurity training is needed to maintain excellent cyber hygiene.

04 May 2022

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement