On Mon, Nov 04, 2002 at 09:58:42AM +0000, SB CH wrote:
hi
   Sorry for the late reply.
The bandwidth clogging depends on the content of the packet. If the packet were (say) 
sent to port 80 , and that too an empty packet, it might be possible that the kernel 
would drop it and send a RST to the peer. In this case there is no handshake and thus 
there would be no open connections. But if the packet contents are valid then it is 
possible that the bandwidth be consumed. Depends on the content of the packet. What 
was the test that you have performed ? Throwing somelight on that can help
hth
phani

> Hello, all.
> 
> As you know, when I received smurf attack which is icmp based attack, the 
> bandwidth is full.
> But when I receive syn flooding attack, the bandwidth is full or not?
> As my test, the syn and ayn+ack packet size is 0.
> So I think that the syn flooding attack has no relations with bandwith 
> based attack? right?
> 
> 
> Thanks in advance.
> 
> 
> 
> 
> 
> _________________________________________________________________
> ���� ���� ���� ������ ���ϰ� ���� �� �ֽ��ϴ�. MSN ����/����  
> http://www.msn.co.kr/stock/ 
> 

Reply via email to