From f80dae7fdfa21fad7ab701de37776798b9aec4ec Mon Sep 17 00:00:00 2001 From: Ram Date: Tue, 21 Jan 2025 13:34:22 -0800 Subject: [PATCH] Update --- teaching/cse153-winter25/Project1-P3.ipynb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teaching/cse153-winter25/Project1-P3.ipynb b/teaching/cse153-winter25/Project1-P3.ipynb index a38bff2..d8a8124 100644 --- a/teaching/cse153-winter25/Project1-P3.ipynb +++ b/teaching/cse153-winter25/Project1-P3.ipynb @@ -16,7 +16,7 @@ "2. **SYN-ACK (Synchronize-Acknowledge):** The server responds with a SYN-ACK packet, acknowledging the client's request and synchronizing its own sequence numbers.\n", "3. **ACK (Acknowledge):** The client sends an ACK packet to the server, confirming the connection establishment.\n", "\n", - "In the ACK flooding attack, the attacker sends numerous TCP packets with the ACK flag set. These ACK packets, often with (high) random or invalid sequence and acknowledgment numbers, are unexpected by the target. The target's TCP stack then wastes resources trying to process and respond to these spurious ACKs. This processing overhead can lead to performance degradation, resource exhaustion, and ultimately, denial of service. Note that ACK flooding attacks may be performed with or without a TCP 3-way handshake, we ask you to implement either one. \n", + "In the ACK flooding attack, the attacker sends numerous TCP packets with the ACK flag set. These ACK packets, often with invalid (high) sequence and acknowledgment numbers, are unexpected by the target. The target's TCP stack then wastes resources trying to process and respond to these spurious ACKs. This processing overhead can lead to performance degradation, resource exhaustion, and ultimately, denial of service. Note that ACK flooding attacks may be performed with or without a TCP 3-way handshake, we ask you to implement either one. \n", "\n", "Key characteristics of the ACK flooding attack:\n", "\n",