{"draft":"draft-ietf-tcpm-syn-flood-05","doc_id":"RFC4987","title":"TCP SYN Flooding Attacks and Common Mitigations","authors":["W. Eddy"],"format":["ASCII","HTML"],"page_count":"19","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"TCP Maintenance and Minor Extensions","abstract":"This document describes TCP SYN flooding attacks, which have been\r\nwell-known to the community for several years. Various\r\ncountermeasures against these attacks, and the trade-offs of each,\r\nare described. This document archives explanations of the attack and\r\ncommon defense techniques for the benefit of TCP implementers and\r\nadministrators of TCP servers or networks, but does not make any\r\nstandards-level recommendations. This memo provides information for the Internet community.","pub_date":"August 2007","keywords":["TCP SYN Flood","TCP SYN Cookies","denial-of-service","DoS"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4987","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4987"}