DoS Attack


First – let’s start by defining a DoS attack – Denial of Service occurs when you or any other internet user is denied the use of their internet connection by whatever means, typically by flooding a link with unwanted traffic, or starting connections to the router and never completing them so that the router’s memory and other resources become overloaded and the router stops routing.

The chances of your being the victim of a DoS attack are slim to nil – inconveniencing you, an individual, serves no purpose – the same resources required to create a DoS attack against you can be put to better use creating an attack on an eCommerce site, a government department, a military installation, where it will have a greater impact.

Second – your router, regardless of what you buy, cannot block a DoS (Denial of Service) attack – a DoS attack cannot be blocked at the downstream end of the link, you can have the most expensive product you can find, and I can still choke the link and deny you service. The only effective way to deal with a DoS attack is to filter the traffic at the upstream end, and that will have to be done by your ISP.

Third – if it was in fact a DoS attack, you wouldn’t be here reading about it, your internet connection would be down and you’d be on the phone with the ISP telling them you want the problem resolved.

Now – what you’re seeing in the logs of your router is the firewall reporting an RST scan, which is when an RST command (an instruction to reset a connection) is received without there being an existing connection – technically speaking, it is a denial of service too, but for the reasons I mentioned above, it’s not really an attack.

DOS-RST

This article is supported by Netgear

However and monitored on our web servers: Any malicious way to disturb our flightsim pleasure will be punished by black listing and banning of the related IP address (or ranges). A User coming from an IP address (or ranges)  and frequently introducing DoS Attacks, will not be able to access our site and servers.

Router Port Testing For Security Holes


A port is like a doorway. Specific services have an associated port number along with the protocol used for communication.
For example email uses 2 ports:
The first service is used to transport email to and from other servers.
This is accomplished with the Simple Mail Transfer Protocol (SMTP).
The SMTP service application usually listens on TCP port 25 for incoming requests.
The second service is the Post Office Protocol (POP) which is used by e-mail client
applications on user’s personal computers to fetch email messages from the server.
The POP service listens on TCP port number 110.
Sadly there are many cyber criminals who use a technique known as Port Scanning to
probe home routers like yours for open ports.
In addition there are also computer worms roaming the Internet looking for open ports
– seriously I am not making this up!
So you want to make sure your Router Ports are hidden from all this scanning.

To do so you can use the FREE service from Gibson Research Corporation (GRC) called:
SHIELDS UP!