What is the purpose of using random IP addresses in SYN Flood Attack?












23















What is the purpose of using random IP addresses in SYN Flood Attack?










share|improve this question





























    23















    What is the purpose of using random IP addresses in SYN Flood Attack?










    share|improve this question



























      23












      23








      23


      5






      What is the purpose of using random IP addresses in SYN Flood Attack?










      share|improve this question
















      What is the purpose of using random IP addresses in SYN Flood Attack?







      flooding






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Feb 8 at 21:01









      Andy Lester

      31226




      31226










      asked Feb 8 at 6:09









      Henok TesfayeHenok Tesfaye

      25219




      25219






















          3 Answers
          3






          active

          oldest

          votes


















          57














          A client opens a TCP connection by sending a SYN packet to a server. The server replies with a single SYN+ACK, and the client responds again with an ACK. Because of natural network latency, the server may wait a short time after sending SYN+ACK to the specified source address for an ACK reply, and this behavior is what a SYN flood exploits. Because the source address was spoofed, the reply will never come. If the server is waiting on enough fake connections that will never be completed, it will become unable to open any new connections, legitimate or not. This condition is called denial of service.



          SYN flood attacks do not require the attacker receive a reply from the victim, so there is no need for the attacker to use its real source address. Spoofing the source address both improves anonymity by making it harder to track down the attacker, as well as making it more difficult for the victim to filter traffic based on IP. After all, if each packet used the same source address (whether spoofed or not), any decent firewall would quickly begin blocking all SYN packets from that address and the attack would fail.






          share|improve this answer

































            6














            A SYN flood can be more easily detected when the source of the attack is using the same IP address. So if a defender is detecting and able to block this activity you will not have a successful attack. Using random IP addresses as part of a SYN flood makes it much harder to detect and defend against making it more likely to be a successful attack.






            share|improve this answer

































              4














              You double your traffic by not using your own IP. The response from the victim goes out to the IP you spoofed, who reply with a RST (subject to caveats).
              Being unpredictable makes them harder to block.



              They are often not completely random though. They are often chosen to be on the attacked network. Also, as the filters are not that smart, they often get away with only sightly shuffled IPs.






              share|improve this answer


























                Your Answer








                StackExchange.ready(function() {
                var channelOptions = {
                tags: "".split(" "),
                id: "162"
                };
                initTagRenderer("".split(" "), "".split(" "), channelOptions);

                StackExchange.using("externalEditor", function() {
                // Have to fire editor after snippets, if snippets enabled
                if (StackExchange.settings.snippets.snippetsEnabled) {
                StackExchange.using("snippets", function() {
                createEditor();
                });
                }
                else {
                createEditor();
                }
                });

                function createEditor() {
                StackExchange.prepareEditor({
                heartbeatType: 'answer',
                autoActivateHeartbeat: false,
                convertImagesToLinks: false,
                noModals: true,
                showLowRepImageUploadWarning: true,
                reputationToPostImages: null,
                bindNavPrevention: true,
                postfix: "",
                imageUploader: {
                brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                allowUrls: true
                },
                noCode: true, onDemand: true,
                discardSelector: ".discard-answer"
                ,immediatelyShowMarkdownHelp:true
                });


                }
                });














                draft saved

                draft discarded


















                StackExchange.ready(
                function () {
                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f203193%2fwhat-is-the-purpose-of-using-random-ip-addresses-in-syn-flood-attack%23new-answer', 'question_page');
                }
                );

                Post as a guest















                Required, but never shown

























                3 Answers
                3






                active

                oldest

                votes








                3 Answers
                3






                active

                oldest

                votes









                active

                oldest

                votes






                active

                oldest

                votes









                57














                A client opens a TCP connection by sending a SYN packet to a server. The server replies with a single SYN+ACK, and the client responds again with an ACK. Because of natural network latency, the server may wait a short time after sending SYN+ACK to the specified source address for an ACK reply, and this behavior is what a SYN flood exploits. Because the source address was spoofed, the reply will never come. If the server is waiting on enough fake connections that will never be completed, it will become unable to open any new connections, legitimate or not. This condition is called denial of service.



                SYN flood attacks do not require the attacker receive a reply from the victim, so there is no need for the attacker to use its real source address. Spoofing the source address both improves anonymity by making it harder to track down the attacker, as well as making it more difficult for the victim to filter traffic based on IP. After all, if each packet used the same source address (whether spoofed or not), any decent firewall would quickly begin blocking all SYN packets from that address and the attack would fail.






                share|improve this answer






























                  57














                  A client opens a TCP connection by sending a SYN packet to a server. The server replies with a single SYN+ACK, and the client responds again with an ACK. Because of natural network latency, the server may wait a short time after sending SYN+ACK to the specified source address for an ACK reply, and this behavior is what a SYN flood exploits. Because the source address was spoofed, the reply will never come. If the server is waiting on enough fake connections that will never be completed, it will become unable to open any new connections, legitimate or not. This condition is called denial of service.



                  SYN flood attacks do not require the attacker receive a reply from the victim, so there is no need for the attacker to use its real source address. Spoofing the source address both improves anonymity by making it harder to track down the attacker, as well as making it more difficult for the victim to filter traffic based on IP. After all, if each packet used the same source address (whether spoofed or not), any decent firewall would quickly begin blocking all SYN packets from that address and the attack would fail.






                  share|improve this answer




























                    57












                    57








                    57







                    A client opens a TCP connection by sending a SYN packet to a server. The server replies with a single SYN+ACK, and the client responds again with an ACK. Because of natural network latency, the server may wait a short time after sending SYN+ACK to the specified source address for an ACK reply, and this behavior is what a SYN flood exploits. Because the source address was spoofed, the reply will never come. If the server is waiting on enough fake connections that will never be completed, it will become unable to open any new connections, legitimate or not. This condition is called denial of service.



                    SYN flood attacks do not require the attacker receive a reply from the victim, so there is no need for the attacker to use its real source address. Spoofing the source address both improves anonymity by making it harder to track down the attacker, as well as making it more difficult for the victim to filter traffic based on IP. After all, if each packet used the same source address (whether spoofed or not), any decent firewall would quickly begin blocking all SYN packets from that address and the attack would fail.






                    share|improve this answer















                    A client opens a TCP connection by sending a SYN packet to a server. The server replies with a single SYN+ACK, and the client responds again with an ACK. Because of natural network latency, the server may wait a short time after sending SYN+ACK to the specified source address for an ACK reply, and this behavior is what a SYN flood exploits. Because the source address was spoofed, the reply will never come. If the server is waiting on enough fake connections that will never be completed, it will become unable to open any new connections, legitimate or not. This condition is called denial of service.



                    SYN flood attacks do not require the attacker receive a reply from the victim, so there is no need for the attacker to use its real source address. Spoofing the source address both improves anonymity by making it harder to track down the attacker, as well as making it more difficult for the victim to filter traffic based on IP. After all, if each packet used the same source address (whether spoofed or not), any decent firewall would quickly begin blocking all SYN packets from that address and the attack would fail.







                    share|improve this answer














                    share|improve this answer



                    share|improve this answer








                    edited Feb 8 at 8:08

























                    answered Feb 8 at 6:13









                    forestforest

                    39.2k18127139




                    39.2k18127139

























                        6














                        A SYN flood can be more easily detected when the source of the attack is using the same IP address. So if a defender is detecting and able to block this activity you will not have a successful attack. Using random IP addresses as part of a SYN flood makes it much harder to detect and defend against making it more likely to be a successful attack.






                        share|improve this answer






























                          6














                          A SYN flood can be more easily detected when the source of the attack is using the same IP address. So if a defender is detecting and able to block this activity you will not have a successful attack. Using random IP addresses as part of a SYN flood makes it much harder to detect and defend against making it more likely to be a successful attack.






                          share|improve this answer




























                            6












                            6








                            6







                            A SYN flood can be more easily detected when the source of the attack is using the same IP address. So if a defender is detecting and able to block this activity you will not have a successful attack. Using random IP addresses as part of a SYN flood makes it much harder to detect and defend against making it more likely to be a successful attack.






                            share|improve this answer















                            A SYN flood can be more easily detected when the source of the attack is using the same IP address. So if a defender is detecting and able to block this activity you will not have a successful attack. Using random IP addresses as part of a SYN flood makes it much harder to detect and defend against making it more likely to be a successful attack.







                            share|improve this answer














                            share|improve this answer



                            share|improve this answer








                            edited Feb 15 at 10:11









                            Sim

                            64311020




                            64311020










                            answered Feb 8 at 13:48









                            Michale RezeneMichale Rezene

                            695




                            695























                                4














                                You double your traffic by not using your own IP. The response from the victim goes out to the IP you spoofed, who reply with a RST (subject to caveats).
                                Being unpredictable makes them harder to block.



                                They are often not completely random though. They are often chosen to be on the attacked network. Also, as the filters are not that smart, they often get away with only sightly shuffled IPs.






                                share|improve this answer






























                                  4














                                  You double your traffic by not using your own IP. The response from the victim goes out to the IP you spoofed, who reply with a RST (subject to caveats).
                                  Being unpredictable makes them harder to block.



                                  They are often not completely random though. They are often chosen to be on the attacked network. Also, as the filters are not that smart, they often get away with only sightly shuffled IPs.






                                  share|improve this answer




























                                    4












                                    4








                                    4







                                    You double your traffic by not using your own IP. The response from the victim goes out to the IP you spoofed, who reply with a RST (subject to caveats).
                                    Being unpredictable makes them harder to block.



                                    They are often not completely random though. They are often chosen to be on the attacked network. Also, as the filters are not that smart, they often get away with only sightly shuffled IPs.






                                    share|improve this answer















                                    You double your traffic by not using your own IP. The response from the victim goes out to the IP you spoofed, who reply with a RST (subject to caveats).
                                    Being unpredictable makes them harder to block.



                                    They are often not completely random though. They are often chosen to be on the attacked network. Also, as the filters are not that smart, they often get away with only sightly shuffled IPs.







                                    share|improve this answer














                                    share|improve this answer



                                    share|improve this answer








                                    edited Mar 4 at 10:23

























                                    answered Feb 8 at 10:46









                                    drjpizzledrjpizzle

                                    1404




                                    1404






























                                        draft saved

                                        draft discarded




















































                                        Thanks for contributing an answer to Information Security Stack Exchange!


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid



                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.


                                        To learn more, see our tips on writing great answers.




                                        draft saved


                                        draft discarded














                                        StackExchange.ready(
                                        function () {
                                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f203193%2fwhat-is-the-purpose-of-using-random-ip-addresses-in-syn-flood-attack%23new-answer', 'question_page');
                                        }
                                        );

                                        Post as a guest















                                        Required, but never shown





















































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown

































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown







                                        Popular posts from this blog

                                        Human spaceflight

                                        Can not write log (Is /dev/pts mounted?) - openpty in Ubuntu-on-Windows?

                                        張江高科駅