{"id":25199,"date":"2023-07-20T03:18:57","date_gmt":"2023-07-20T03:18:57","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=25199"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"description-of-ads-attack-logs-syn-flood-logs-part-1","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/description-of-ads-attack-logs-syn-flood-logs-part-1\/","title":{"rendered":"Description of ADS Attack Logs: SYN Flood Logs (Part 1)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><strong>Introduction to SYN Flood<\/strong><\/p>\n\n\n\n<p>A three-way handshake is required to establish a TCP connection. First, the client sends a TCP SYN packet to the server. The server responds to the client request with an SYN-ACK packet. Then the server waits and expects an ACK packet from the client. At this time, the connection is in the SYN_RECV state. The TCP connection remains half-open until the server receives an ACK packet from the client or the TCP timer times out.<\/p>\n\n\n\n<p>The server can handle a limited number of concurrent half-open connections, for it has limited resources. In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#8217;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.<\/p>\n\n\n\n<p><strong>Description of SYN Flood Protection Logs<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Invalid_SYN_Packet<\/li>\n<\/ol>\n\n\n\n<p>Choose <strong>Policy &gt; Anti-DDoS &gt; Protection Groups &gt; Protection Groups<\/strong>, and enable <strong>Invalid SYN Packet Filtering<\/strong>.<\/p>\n\n\n\n<p>Invalid SYN packets will be filtered out, such as 64-byte SYN packets.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25200\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-300x90.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-768x230.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1536x461.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-600x180.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-200x60.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1.png 1861w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>When attack traffic is generated, captured packets in ADS. In the example, you can see that the TCP header does not contain the <strong>option<\/strong> field. This type of SYN packet is called a malformed packet. After the <strong>Invalid SYN Packet Filtering<\/strong> policy is triggered, the SYN packet will be dropped.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1.png\"><img decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-1024x456.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25202\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-1024x456.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-300x134.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-768x342.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-1536x685.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-600x267.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1-200x89.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/2-1.png 1909w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Choose <strong>Logs &gt; Attack Log &gt; Attack Details<\/strong> to view log details, and you can see that the <strong>Invalid_SYN_Packet<\/strong> policy is triggered.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-1024x389.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25204\" width=\"845\" height=\"321\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-1024x389.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-300x114.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-768x292.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-1536x584.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-600x228.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1-200x76.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/3-1.png 1866w\" sizes=\"(max-width: 845px) 100vw, 845px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>On the <strong>Real-Time Monitoring<\/strong> page, you can see that the traffic is dropped.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"516\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-1024x516.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25206\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-1024x516.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-300x151.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-768x387.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-1536x775.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-600x303.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1-200x101.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/4-1.png 1856w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Port_Check<\/li>\n<\/ol>\n\n\n\n<p>After the port check policy is configured and the port check function is enabled, the system checks the data arriving at the specified port and continues to process the data arriving at other ports by using other algorithms in Protection Groups.<\/p>\n\n\n\n<p>Choose <strong>Policy &gt; Protection Groups &gt; Protection Groups<\/strong>, and configure the port check policy.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"446\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-1024x446.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25208\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-1024x446.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-300x131.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-768x335.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-1536x669.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-600x261.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1-200x87.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/5-1.png 1866w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>When attack traffic is generated, captured packets in ADS. The destination ports of these packets are the same as the ports in the above-mentioned port check policy.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"249\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-1024x249.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25210\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-1024x249.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-300x73.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-768x187.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-600x146.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6-200x49.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/6.png 1218w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>If the ADS port check policy is matched. Choose <strong>Logs &gt; Attack Log &gt; Attack Details<\/strong> to view log details, and you can see that the <strong>Port_Check<\/strong> policy is triggered.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"282\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-1024x282.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25212\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-1024x282.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-300x83.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-768x212.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-1536x423.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-600x165.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7-200x55.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/7.png 1861w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>On the <strong>Real-Time Monitoring<\/strong> page, you can see that the traffic is dropped.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-1024x425.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25214\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-1024x425.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-300x124.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-768x319.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-1536x637.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-600x249.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8-200x83.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/8.png 1837w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to SYN Flood A three-way handshake is required to establish a TCP connection. First, the client sends a TCP SYN packet to the server. The server responds to the client request with an SYN-ACK packet. Then the server waits and expects an ACK packet from the client. At this time, the connection is in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[23],"tags":[372],"class_list":["post-25199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ads","tag-ddos-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS<\/title>\n<meta name=\"description\" content=\"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#039;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#039;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T03:18:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#039;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Description of ADS Attack Logs: SYN Flood Logs (Part 1)\",\"datePublished\":\"2023-07-20T03:18:57+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/\"},\"wordCount\":409,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/1-1-1024x307-1.png\",\"keywords\":[\"DDoS attack\"],\"articleSection\":[\"ADS\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/\",\"name\":\"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/1-1-1024x307-1.png\",\"datePublished\":\"2023-07-20T03:18:57+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server's resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/1-1-1024x307-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/1-1-1024x307-1.png\",\"width\":1024,\"height\":307,\"caption\":\"Network settings page with protocol filtering options.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/description-of-ads-attack-logs-syn-flood-logs-part-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Description of ADS Attack Logs: SYN Flood Logs (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS","description":"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server's resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS","og_description":"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#039;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.","og_url":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/","og_site_name":"NSFOCUS","article_published_time":"2023-07-20T03:18:57+00:00","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS","twitter_description":"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server&#039;s resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Description of ADS Attack Logs: SYN Flood Logs (Part 1)","datePublished":"2023-07-20T03:18:57+00:00","dateModified":"2026-04-17T18:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/"},"wordCount":409,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","keywords":["DDoS attack"],"articleSection":["ADS"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/","url":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/","name":"Description of ADS Attack Logs: SYN Flood Logs (Part 1) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","datePublished":"2023-07-20T03:18:57+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"In SYN flood attacks, attackers send a large number of SYN packets with forged source IP addresses and ports to the targeted server. An overwhelming number of half-open connections will exhaust the server's resources, and eventually, the server cannot respond to requests from legitimate clients, leading to a denial of service.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/1-1-1024x307-1.png","width":1024,"height":307,"caption":"Network settings page with protocol filtering options."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/description-of-ads-attack-logs-syn-flood-logs-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Description of ADS Attack Logs: SYN Flood Logs (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25199"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35694"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=25199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=25199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}