Router defense attack technology analysis

  
Nowadays, the router has become the target of many hackers. In the face of the increasingly severe router security environment, how should we ensure the security of our routers? The following is a brief introduction to several common router attack and defense technologies. First, the most common attack method is the Smurf attack. It uses a reasonable service request to occupy too many service resources, so that legitimate users can't get the response of the service. There are many ways to attack, but they all have some common models. Features, use spoofed source addresses, use network protocol flaws, exploit vulnerabilities in operating systems or software, generate large amounts of useless packets on the network, consume service resources, and more. Second, the Smurf attack is named according to its attack program. It is an ICMP echo flooding attack. In such an attack, the host pointed to by the spoofed source address contained in the ping packet is the ultimate victim and the main victim. The broadcast network segment connected by the router becomes the accomplice of the attack, similar to an amplifier, which makes the network traffic increase rapidly and is also a victim. Third, according to the characteristics of the Smurf attack, you can defend against Smurf attacks from two aspects. One is to prevent your own network from becoming the first victim of the attack, and the other is to defend against the Smurf attack from the perspective of the ultimate victim. Smurf wants to use a network as a traffic amplifier. The network must have the following characteristics: (1) The router allows packets with IP source address spoofing to pass; (2) The router converts directed broadcast (data packets sent to the broadcast address) into the first The second layer broadcasts and broadcasts to the connected network segment; (3) the host on the broadcast network allows to respond to the ping broadcast; (4) the router does not limit the ping data traffic that the host responds to. Therefore, the network can be re-planned according to the above points, so that the local network does not have the condition that it will become a traffic amplifier, which can greatly reduce the possibility of being attacked. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved