The difference between flooding and broadcasting

Source: Internet
Author: User

The purpose of the broadcast packet host is the entire network user, the use of broadcast address, on all ports to send packets, the behavior is active, can be understood as three layers of behavior;

Flooding means that the switch cannot find an entry in the Mac table that matches the destination address of the packet, sending the packet out of all ports (in addition to receiving the port of the packet), in order to find the target host to receive the packet, can understand the behavior of 2 layer;

Flooding does not require maintaining the topology of the network and related routing calculations, only the nodes that receive the information are required to forward the packets in a broadcast manner. For example, the source node wants to send a piece of data to the target node. The source node first passes a copy of the data over the network to each of its neighbor nodes, and each neighbor node transmits the data to its own other than the node that sent the data. This continues until the data is transferred to the target node or the data set lifetime (Ttl,time to Live) is 0.

Flooding includes:

1) SYN flood attack

The SYN attack utilizes TCP's three-time handshake mechanism, where the attacker uses a forged IP address to make a request to the attacking end, and the response message sent by the attacker will never be sent to the destination, so the attacker consumes resources while waiting to close the connection, if there are thousands of such connections, The host resource will be exhausted to achieve the purpose of the attack. We can take advantage of the router's TCP interception feature to make the hosts on the network protected (for example, Cisco routers).

2) DHCP message flooding attack

DHCP message flood attack refers to: malicious users using tools to forge a large number of DHCP packets sent to the server, on the one hand, malicious exhaustion of IP resources, so that legitimate users can not access IP resources;

On the other hand, if the DHCP snooping function is turned on on the switch, the received DHCP packets are sent to the CPU. As a result, a large number of DHCP message attack devices can cause the DHCP server to run at high load and even crash the device.

3) ARP message flood attack

The ARP message flooding is similar to the DHCP flooding, also is the malicious user sends the massive ARP message, causes the ARP table entry overflow of the L3 device, affects the normal user's forwarding.

The difference between flooding and broadcasting

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.