Question
How does SYN flood attack work and how can it be mitigated?
Asked by: USER9849
59 Viewed
59 Answers
Responsive Ad After Question
Answer (59)
A SYN flood attack exploits the TCP handshake process. Attackers send a flood of SYN packets without completing the handshake, exhausting server resources. Mitigation techniques include SYN cookies, SYN proxy, and rate limiting.