Portable Cyber Security Box - Protection from all Cybersecurity threats

The Security Box

Security Box allows you freedom to work at home, at co-working place, during travel. Just connect with USB power of your laptop and work with peace of mind. Having dual connectivity for internet - USB and Ethernet, while wirelessly connect with built-in secure Access point to connect multiple computers and sharing secure internet with data security & protection of critical data for businesses. Being online and yet staying away from cyber attacks is the FORTE of Security Box.



 

 

denial of service attacks ddos syn flood



  1. SYN FLOOD : They are concept-based Denial of Service attacks and rely on the 3 way handshake, filling up a table known as the TCB. TCB or the Transmission Control Block is a transport protocol data structure that holds all the information about a connection.


When the server receives the initial SYN packet from the client, it creates an entry in the TCB. The server then responds with the SYN+ACK packet, and hopes that the client would send a ACK packet as soon as it receives the SYN+ACK. The connection is in a TIME_WAIT() status, as long as the server waits for the final packet from the client. If the ACK packet is not received by the server in sometime, it believes that it has been lost somewhere in the network, thus it sends another SYN+ACK packet. Finally if after multiple retries, none of the SYN+ACK packet are acknowledged by the client, the session is closed, and this time duration is around 30 seconds.

During this time period, it is possible to send thousands of SYN packets to a server, thus creating a large number of entries in TCB, making it overloaded, and not accepting any new connection. So now, even when a legitimate user would be sending his SYN packet, it would be ignored, as there is no more space left in the TCB.

To generate this kind of attack, hping3 utility could be used.

hping3 --rand-source –S –L 0 –p [target port] [target IP]