Kaspersky Lab kaspersky anti-hacker 1.7 Manuel D’Utilisation

Page de 101
68
 
Kaspersky Anti-Hacker 
•  The Land attack involves transmission of a self-connection request (when 
a computer is requested to connect to itself) to your computer. It results in 
an endless loop as your computer attempts to connect to itself. Conse-
quently, the CPU load and the probability of emergency shutdown in-
crease drastically. 
•  The Scanning TCP ports attack involves detection of open TCP ports on 
your computer. This type of attack is used to search a computer for weak 
points and is usually followed by more dangerous attack types. You can 
define the following settings for this attack type: Port count: – the number 
of ports the remote machine attempts to open, and Time (sec): – the time 
it takes. 
•  The Scanning UDP ports attack involves detection of open UDP ports on 
your computer. The attack is detected by the quantity of UDP packets 
sent to various computer ports over a certain time period. This type of at-
tack is used to search a computer for weak points and is usually followed 
by more dangerous attack types. You can define the following settings for 
this attack type: Port count: – the number of ports the remote machine 
attempts to open, и Time (sec): – the time it takes. 
•  The SYN Flood attack involves sending of a false connection request set 
to your computer. The system reserves certain resources for every con-
nection request. As a result the computer does not respond to connection 
requests from other sources. You can define the following settings for this 
attack type: Connection count: – the number of connections the remote 
machine attempts to establish, and Time (sec): – the time it takes. 
•  The UDP Flood attack involves sending of special UDP packets to your 
computer. These packets are endlessly transmitted between the affected 
machines. Consequently, this attack consumes substantial resources and 
overloads the communication link. You can define the following settings 
for this attack type: UDP packet count: – the number of incoming UDP 
packets, and Time (sec): – the time it takes. 
•  The ICMP Flood attack involves sending of ICMP packets to your com-
puter. It results in an increase in the CPU load of the affected machine as 
it responds to every packet. You can define the following settings for this 
attack type: ICMP packet count: – the number of incoming ICMP pack-
ets, and Time (sec): – the time it takes. 
•  The Helkern attack involves sending of special UDP packets (able to exe-
cute a malicious code) to an attacked machine. This attack results in 
slowdown of the Internet connection.