On Mon, Nov 04, 2002 at 09:58:42AM +0000, SB CH wrote: hi Sorry for the late reply. The bandwidth clogging depends on the content of the packet. If the packet were (say) sent to port 80 , and that too an empty packet, it might be possible that the kernel would drop it and send a RST to the peer. In this case there is no handshake and thus there would be no open connections. But if the packet contents are valid then it is possible that the bandwidth be consumed. Depends on the content of the packet. What was the test that you have performed ? Throwing somelight on that can help hth phani
> Hello, all. > > As you know, when I received smurf attack which is icmp based attack, the > bandwidth is full. > But when I receive syn flooding attack, the bandwidth is full or not? > As my test, the syn and ayn+ack packet size is 0. > So I think that the syn flooding attack has no relations with bandwith > based attack? right? > > > Thanks in advance. > > > > > > _________________________________________________________________ > ���� ���� ���� ������ ���ϰ� ���� �� �ֽ��ϴ�. MSN ����/���� > http://www.msn.co.kr/stock/ >
