Understanding Denial-Of-Service Attacks - CISA
Understanding Denial-Of-Service Attacks - CISA
TLP:WHITE
You may have heard of denial-of-service attacks launched against websites, but you can also be a victim of these attacks. Denial-of-
service attacks can be di icult to distinguish from common network activity, but there are some indications that an attack is in
progress.
In a Smurf Attack, the attacker sends Internet Control Message Protocol broadcast packets to a
number of hosts with a spoofed source Internet Protocol (IP) address that belongs to the target
machine. The recipients of these spoofed packets will then respond, and the targeted host will be
flooded with those responses.
A SYN flood occurs when an attacker sends a request to connect to the target server, but never
completes the connection through what is known as a three-way handshake—a method used in a
TCP/IP network to create a connection between a local host/client and server. The incomplete
handshake leaves the connected port in an occupied status and unavailable for further requests. An
attacker will continue to send requests, saturating all open ports, so that legitimate users cannot
connect.
Individual networks may be a ected by DoS attacks without being directly targeted. If the network’s
internet service provider (ISP) or cloud service provider has been targeted and attacked, the network
will also experience a loss of service.
TLP:WHITE
https://www.us-cert.gov/ncas/tips/ST04-015 1/3
11/7/2019 Understanding Denial-of-Service Attacks | CISA
Contact your Network Administrator to confirm whether the service outage is due to maintenance
or an in-house network issue. They can also monitor network tra ic to confirm the presence of an
attack, identify the source and mitigate the situation by applying firewall rules and possibly
rerouting tra ic through a DoS protection service.
Contact your ISP to ask if there is an outage on their end or even if their network is the target of the
attack and you are an indirect victim. They may be able to advise you on an appropriate course of
action.
In the case of an attack, do not lose sight of the other hosts, assets, or services residing on your
network. Many attackers conduct DoS or DDoS attacks to deflect attention away from their intended
target and use the opportunity to conduct secondary attacks on other services within your network.
Authors
NCCIC
This product is provided subject to this Notification and this Privacy & Use policy.
TLP:WHITE
https://www.us-cert.gov/ncas/tips/ST04-015 3/3