ZyWALL 5/35/70 Series User’s Guide
response. While the targeted system waits for the ACK that follows the
Figure 91 SYN Flood
bIn a LAND Attack, hackers flood SYN packets into the network with a spoofed source IP address of the targeted system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.
•A
Chapter 10 Firewalls | 202 |