<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AIP-SSM 40 and TCP Syn/Ack Attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282753#M68695</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I am looking for a good Packet Generator tool to simulate a TCP Syn attack or DDOS attack. Could some one give me some inputs on this plz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is BackTrack a good tool or there any other good tools available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Sep 2009 16:11:16 GMT</pubDate>
    <dc:creator>subra4u</dc:creator>
    <dc:date>2009-09-21T16:11:16Z</dc:date>
    <item>
      <title>AIP-SSM 40 and TCP Syn/Ack Attack</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282751#M68692</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some of our sites are under constant attack with TCP Syn/Ack i.e Syn followed by an Ack and no Get HTTP. Would want the Firewall to hold the traffic until there is a geniune payload. Plz Help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the sequence&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attacker sends SYN&lt;/P&gt;&lt;P&gt;Server sends SYN/ACK&lt;/P&gt;&lt;P&gt;Attacker sends ACK&lt;/P&gt;&lt;P&gt;Server waits for the Get&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We see 1000s of connections created in a sec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282751#M68692</guid>
      <dc:creator>subra4u</dc:creator>
      <dc:date>2019-03-10T11:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM 40 and TCP Syn/Ack Attack</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282752#M68693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLease find the config in the attachment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone tell me why the CPU goes 100% when the attack is not even 100 mbps of traffic. Is the throughput or performance of the ASA is the same when it is under attack too. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Aug 2009 20:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282752#M68693</guid>
      <dc:creator>subra4u</dc:creator>
      <dc:date>2009-08-28T20:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM 40 and TCP Syn/Ack Attack</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282753#M68695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I am looking for a good Packet Generator tool to simulate a TCP Syn attack or DDOS attack. Could some one give me some inputs on this plz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is BackTrack a good tool or there any other good tools available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Sep 2009 16:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282753#M68695</guid>
      <dc:creator>subra4u</dc:creator>
      <dc:date>2009-09-21T16:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM 40 and TCP Syn/Ack Attack</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282754#M68697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You want to configure "TCP Intercept" on your firewall. One reason that a small (100 Mb/s) amount of traffic can saturate your sensor is that these attacks only require very small packets. &lt;/P&gt;&lt;P&gt;Once you start loading down the sensor with hundreds or thousands of attacks per second, the sensor gets pretty busy taking care of all the related functions (writing events to the event store, reporting to a manager, etc)&lt;/P&gt;&lt;P&gt;Sensor bandwidth sizing is not based on a huge number of attacks per second.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Sep 2009 22:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282754#M68697</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2009-09-21T22:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: AIP-SSM 40 and TCP Syn/Ack Attack</title>
      <link>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282755#M68699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a 1 Gig Pipe and we found a 30 Mbps unwanted traffic with a session rate of 150+ Kpps. Do you think AIP-SSM-40 on a ASA 5540 can stand this kind of attack. Want to know how others mitigate this size of attack. Please share your experience. In the trace we saw a lot of TCP SYN followed by a ACK whether you send SYN/ACK or dont send it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Sep 2009 05:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aip-ssm-40-and-tcp-syn-ack-attack/m-p/1282755#M68699</guid>
      <dc:creator>subra4u</dc:creator>
      <dc:date>2009-09-22T05:41:52Z</dc:date>
    </item>
  </channel>
</rss>

