First – let’s start by defining a DoS attack – Denial of Service occurs when you or any other internet user is denied the use of their internet connection by whatever means, typically by flooding a link with unwanted traffic, or starting connections to the router and never completing them so that the router’s memory and other resources become overloaded and the router stops routing.
The chances of your being the victim of a DoS attack are slim to nil – inconveniencing you, an individual, serves no purpose – the same resources required to create a DoS attack against you can be put to better use creating an attack on an eCommerce site, a government department, a military installation, where it will have a greater impact.
Second – your router, regardless of what you buy, cannot block a DoS (Denial of Service) attack – a DoS attack cannot be blocked at the downstream end of the link, you can have the most expensive product you can find, and I can still choke the link and deny you service. The only effective way to deal with a DoS attack is to filter the traffic at the upstream end, and that will have to be done by your ISP.
Third – if it was in fact a DoS attack, you wouldn’t be here reading about it, your internet connection would be down and you’d be on the phone with the ISP telling them you want the problem resolved.
Now – what you’re seeing in the logs of your router is the firewall reporting an RST scan, which is when an RST command (an instruction to reset a connection) is received without there being an existing connection – technically speaking, it is a denial of service too, but for the reasons I mentioned above, it’s not really an attack.
This article is supported by Netgear
However and monitored on our web servers: Any malicious way to disturb our flightsim pleasure will be punished by black listing and banning of the related IP address (or ranges). A User coming from an IP address (or ranges) and frequently introducing DoS Attacks, will not be able to access our site and servers.