SYN Flooding Attack
University Projects #Cybersecurity#Distributed Computing
NOTEClick this link to view the full write-up.
Overview
A hands-on network security lab demonstrating the TCP SYN flood attack—a classic denial-of-service technique that overwhelms a server’s connection queue with half-open connections. Also explores the SYN Cookie countermeasure that enables servers to maintain availability under attack.
Key Concepts
- Set up Docker-based attack environment with attacker, victim, and user containers
- Compiled and deployed SYN flood attack program using raw sockets
- Demonstrated successful DoS attack filling TCP connection queue
- Enabled SYN Cookie countermeasure and verified legitimate connections succeed
- Analyzed TCP connection states using netstat during attack
Technologies
C, Raw Sockets, TCP/IP, Docker, Network Security, Denial of Service, netstat