{
	"id": "53dce7a5-b16d-4aee-9388-7b8f99108496",
	"created_at": "2026-04-06T00:15:47.252153Z",
	"updated_at": "2026-04-10T03:20:59.680509Z",
	"deleted_at": null,
	"sha1_hash": "82295e38e21e25da8338d1d9b5f4b3ffffcb7ccb",
	"title": "SYN-Ack Flood Attack - Corero",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 78119,
	"plain_text": "SYN-Ack Flood Attack - Corero\r\nArchived: 2026-04-05 19:51:46 UTC\r\nThe Wayback Machine - https://web.archive.org/web/20220119104451/https://www.corero.com/resource-hub/syn-ack-flood-attack/\r\nWhat is a SYN-ACK Flood Attack?\r\nAttack Description:\r\nIn an ACK DDoS attack (or ACK-PUSH Flood), attackers send spoofed ACK (or ACK-PUSH) packets at very\r\nhigh packet rates that fail to belong to any current session within the firewall’s state-table and/or server’s\r\nconnection list. Typically, a smaller botnet sends spoofed SYN packets to large numbers of servers and proxies on\r\nthe Internet that generate large numbers of SYN-ACK packets in response to incoming SYN requests from the\r\nspoofed attackers. This SYN-ACK flood is not directed back to the botnet, but instead, is directed back to victim’s\r\nnetwork and often exhausts the victim’s firewalls by forcing state-table lookups for every incoming SYN-ACK\r\npacket.  This denial of service attack can render stateful devices inoperable and can also consume excessive\r\namounts of resources on routers, servers and IPS/IDS devices.\r\nThe ACK flood exhausts a victim’s firewalls by forcing state-table lookups and depletes server resources used to\r\nmatch these incoming packets to an existing flow.\r\nHOW TO PROTECT AGAINST SYN-ACK FLOOD:\r\nDuring a DDoS attack, a firewall is easily compromised, offering no defense to servers downstream. Corero’s\r\ntechnology blocks the bad traffic and allows all normal/good traffic to pass through.\r\nAdditional \u0026 Related Information:\r\nSYN Flood\r\nFrequently Asked Questions About DDoS Attacks\r\nOn-Premises Defense Against SYN-ACK Flood Attacks\r\nhttps://web.archive.org/web/20220119104451/https://www.corero.com/resource-hub/syn-ack-flood-attack/\r\nPage 1 of 2\n\nSource: https://web.archive.org/web/20220119104451/https://www.corero.com/resource-hub/syn-ack-flood-attack/\r\nhttps://web.archive.org/web/20220119104451/https://www.corero.com/resource-hub/syn-ack-flood-attack/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://web.archive.org/web/20220119104451/https://www.corero.com/resource-hub/syn-ack-flood-attack/"
	],
	"report_names": [
		"syn-ack-flood-attack"
	],
	"threat_actors": [],
	"ts_created_at": 1775434547,
	"ts_updated_at": 1775791259,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/82295e38e21e25da8338d1d9b5f4b3ffffcb7ccb.pdf",
		"text": "https://archive.orkl.eu/82295e38e21e25da8338d1d9b5f4b3ffffcb7ccb.txt",
		"img": "https://archive.orkl.eu/82295e38e21e25da8338d1d9b5f4b3ffffcb7ccb.jpg"
	}
}