Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

What is the ACK Storm Protection under stateful configuration in Deep Security Manager?

    • Updated:
    • 17 May 2016
    • Product/Version:
    • Deep Security 8.0
    • Deep Security 9.0
    • Deep Security 9.5
    • Deep Security as a Service 2.0
    • Platform:
    • Unix - Solaris (Sun) version 10 (SunOS 5.10)
    • Unix - Solaris (Sun) version 8 (SunOS 5.8)
    • Unix - Solaris (Sun) version 9 (SunOS 5.9)
    • Windows 2000 Professional
    • Windows 2003 Standard Server Edition
    • Windows 2008 Standard Server Edition
    • Windows Vista 32-bit
    • Windows XP Home
Summary

This article contains information about the Acknowledging Datagram Packet (ACK) Storm Protection in Deep Security.

Details
Public

The acknowledging datagram packet (ACK) storm is a documented network anomaly (RCF 1337 TIME-WAIT Assassination Hazards) where an unsolicited ACK is received by the host.

The server responds with an ACK pointing back to the source peer and a loop is created. This can occur legitimately and is usually a short-lived event since the loss of any duplication ACK will end the storm.

However, an attacker can leverage this anomaly to launch a denial of service attack by sending several hundred malformed ACKs over the same TCP session.

The information that we got regarding this matter states that most vendors ignore this condition even though Sun published the following advisory as a side effect of its TCP implementation: Solaris Hosts are Vulnerable to a Denial of Service Induced by an Internet Transmission Control Protocol (TCP) "ACK Storm"

Deep Security has taken the proactive approach to include a specific protection mechanism for potential DoS attacks.

The protection against ACK Storm can be configured under the Stateful Configurations in the Deep Security Manager (DSM).

Premium
Internal
Rating:
Category:
Troubleshoot
Solution Id:
1054509
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.