. . . "SYN flood \u2013 jeden z popularnych atak\u00F3w w sieciach komputerowych. Jego celem jest g\u0142\u00F3wnie zablokowanie us\u0142ug danego serwera (DoS). Do przeprowadzenia ataku wykorzystywany jest protok\u00F3\u0142 TCP."@pl . "Een SYN-flood (synchronous flood) is een DoS-aanval. Bij een SYN-flood wordt een groot aantal verbindingsaanvragen gedaan door een groot aantal SYN-pakketten met foute bron-IP-adressen naar een server te sturen. Voor iedere aanvraag reserveert een server bronnen (bijvoorbeeld geheugen of een socket). Als de server vervolgens een bericht terugstuurt om aan te geven dat hij klaar is voor de verbinding, wordt dit bericht naar het verkeerde IP-adres gestuurd. De server krijgt vervolgens geen bericht terug en terwijl de server op antwoord wacht, blijven de gereserveerde bronnen in gebruik. Als er een groot aantal van dit soort aanvragen vlak na elkaar wordt verzonden kan dit ertoe leiden dat de server niet langer voor \"echte\" aanvragen bereikbaar is of dat de server zelfs crasht."@nl . . . "SYN flood"@it . . . . . . . . . . . . "SYN flood"@zh . . . "SYN-flood"@nl . "Sebuah SYN flood adalah bentuk serangan penolakan layanan di mana penyerang dengan cepat memulai koneksi ke server tanpa menyelesaikan koneksi. Server harus menghabiskan sumber daya menunggu koneksi yang setengah terbuka, yang dapat menghabiskan sumber daya yang cukup untuk membuat sistem tidak responsif terhadap lalu lintas yang sah. Paket yang dikirimkan penyerang adalah paket SYN, bagian dari jabat tangan tiga arah TCP yang digunakan untuk membuat sambungan."@in . . "SYN flood\u6216\u7A31SYN\u6D2A\u6C34\u3001SYN\u6D2A\u6CDB\u662F\u4E00\u7A2E\u963B\u65B7\u670D\u52D9\u653B\u64CA\uFF0C\u8D77\u56E0\u65BC\u653B\u64CA\u8005\u50B3\u9001\u4E00\u7CFB\u5217\u7684SYN\u8ACB\u6C42\u5230\u76EE\u6A19\u7CFB\u7D71\u3002 \u7576\u7528\u6236\u7AEF\u8A66\u8457\u8207\u4F3A\u670D\u5668\u9593\u5EFA\u7ACBTCP\u9023\u7DDA\u6642\uFF0C\u6B63\u5E38\u60C5\u6CC1\u4E0B\u7528\u6236\u7AEF\u8207\u4F3A\u670D\u5668\u7AEF\u4EA4\u63DB\u4E00\u7CFB\u5217\u7684\u4FE1\u606F\u5982\u4E0B\uFF1A 1. \n* \u7528\u6236\u7AEF\u900F\u904E\u50B3\u9001SYN\u540C\u6B65\uFF08synchronize\uFF09\u4FE1\u606F\u5230\u4F3A\u670D\u5668\u8981\u6C42\u5EFA\u7ACB\u9023\u7DDA\u3002 2. \n* \u4F3A\u670D\u5668\u900F\u904E\u97FF\u61C9\u7528\u6236\u7AEFSYN-ACK\u4EE5\u6284\u6536\uFF08acknowledge\uFF09\u8ACB\u6C42\u3002 3. \n* \u7528\u6236\u7AEF\u7B54\u61C9ACK\uFF0C\u9023\u7DDA\u96A8\u4E4B\u5EFA\u7ACB\u3002 \u9019\u5373\u662F\u6240\u8B02TCP\u4E09\u5411\u4EA4\u63E1\uFF0C\u4E26\u4E14\u9019\u662F\u6BCF\u500B\u4F7F\u7528TCP\u50B3\u8F38\u5354\u8B70\u5EFA\u7ACB\u9023\u7DDA\u7684\u57FA\u790E\u3002 SYN flood\u662F\u4E00\u7A2E\u5EE3\u70BA\u4EBA\u77E5\u7684\u653B\u64CA\uFF0C\u4E00\u822C\u5C0D\u73FE\u4EE3\u7DB2\u8DEF\u4E0D\u592A\u6709\u6548\u3002\u9019\u7A2E\u653B\u64CA\u53EA\u6709\u5728\u4F3A\u670D\u5668\u5728\u6536\u5230SYN\u5F8C\u5206\u914D\u8CC7\u6E90\uFF0C\u4F46\u5728\u6536\u5230ACK\u4E4B\u524D\u9019\u500B\u5340\u6BB5\u6709\u6548\u3002 SYN flood\u653B\u64CA\u76EE\u524D\u6709\u5169\u7A2E\u65B9\u6CD5\uFF0C\u4E0D\u904E\u90FD\u8207\u4F3A\u670D\u5668\u7AEF\u6C92\u6536\u5230ACK\u6709\u95DC\u3002\u60E1\u610F\u7528\u6236\u53EF\u4EE5\u8DF3\u904E\u50B3\u9001\u6700\u5F8C\u7684ACK\u4FE1\u606F\uFF1B\u6216\u8005\u5728SYN\u88E1\u900F\u904E\u6B3A\u9A19\u4F86\u6E90IP\u4F4D\u5740\uFF0C\u9019\u8B93\u4F3A\u670D\u5668\u9001SYN-ACK\u5230\u5047\u9020\u7684IP\u4F4D\u5740\uFF0C\u56E0\u6B64\u6C38\u4E0D\u53EF\u80FD\u6536\u5230ACK\u3002\u9019\u5169\u500B\u6848\u4F8B\u4F3A\u670D\u5668\u6703\u82B1\u9EDE\u6642\u9593\u7B49\u6284\u6536\u901A\u77E5\uFF0C\u6545\u4E00\u500B\u7C21\u55AE\u7684\u7DB2\u8DEF\u58C5\u585E\u53EF\u80FD\u662F\u7531\u65BC\u6C92\u6709ACK\u9020\u6210\u7684\u3002 \u5982\u679C\u9019\u4E9B\u7D81\u5B9A\u4F3A\u670D\u5668\u8CC7\u6E90\uFF0C\u900F\u904E\u6D77\u91CFSYN\u4FE1\u606F\u6DF9\u6C92\u4F3A\u670D\u5668\u662F\u6709\u53EF\u80FD\u8017\u76E1\u5176\u8CC7\u6E90\u3002\u4E00\u65E6\u6240\u6709\u8CC7\u6E90\u90FD\u64A5\u7D66\u534A\u958B\u901A\u9023\u7DDA\u6240\u4FDD\u7559\uFF0C\u6C92\u6709\u65B0\u7684\u9023\u7DDA\uFF08\u4E0D\u7BA1\u5408\u6CD5\u4E0D\u5408\u6CD5\uFF09\u53EF\u88AB\u5EFA\u7ACB\uFF0C\u5C0E\u81F4\u963B\u65B7\u670D\u52D9\u653B\u64CA\u3002\u5982\u679C\u7CFB\u7EDF\u8C03\u7528\u51FD\u6570\u9700\u8981\u4F7F\u7528\u5230\u6B64\u7C7B\u88AB\u6D88\u8017\u8D44\u6E90\uFF0C\u67D0\u4E9B\u7CFB\u7D71\u53EF\u80FD\u6703\u51FA\u73B0\u6781\u4E3A\u4E25\u91CD\u7684\u6545\u969C\uFF0C\u751A\u81F3\u5B95\u6A5F\u3002 \u904E\u53BB(1996\u5E74)\u7528\u4F86\u5206\u914D\u8CC7\u6E90\u7D66\u534A\u958B\u901A\u9023\u7DDA\u7684\u6280\u8853\u727D\u6D89\u5230\u901A\u5E38\u76F8\u7576\u77ED\u7684\u4F47\u5217\u3002\u4F47\u5217\u7684\u6BCF\u500B\u7A7A\u4F4D\u53EF\u5728\u9023\u7DDA\u5B8C\u6210\u3001\u6216\u8005\u5230\u671F\u6642\u88AB\u6E05\u7A7A\u3002\u7576\u4F47\u5217\u6EFF\u6642\uFF0C\u65B0\u9032\u4F86\u7684\u9023\u7DDA\u5EFA\u7ACB\u6703\u5931\u6557\u3002\u4EE5\u4E0A\u9762\u7684\u7BC4\u4F8B\u4F86\u8AAA\uFF0C\u6240\u6709\u65B0\u9032\u4F86\u7684\u9023\u7DDA\u5728\u7E3D\u51718\u500B\u5C01\u5305\u88AB\u9001\u51FA\u4E4B\u524D\u6703\u88AB\u963B\u64CB\u4E0B\u4F86\u3002\u4E5F\u5C31\u662F\u8AAA\uFF0C\u6BCF3\u5206\u9418\u6B63\u6642\u7B97\u597D\u76848\u500B\u5C01\u5305\u5C07\u963B\u65B7\u6240\u6709\u65B0\u9032\u7684TCP\u9023\u7DDA\u5B8C\u6210\u3002\u9019\u8B93\u9019\u7A2E\u963B\u65B7\u670D\u52D9\u653B\u64CA\u53EA\u9808\u4F54\u5F88\u5C0F\u7684\u50B3\u8F38\u91CF\u3002 \u5EFA\u8B70\u7684\u53CD\u5236\u65B9\u6CD5\u5305\u62ECSYN cookie\u6216\u8005\u9650\u5B9A\u67D0\u4E00\u6BB5\u6642\u9593\u5167\u4F86\u81EA\u540C\u4E00\u4F86\u6E90\u8ACB\u6C42\u65B0\u9023\u7DDA\u7684\u6578\u91CF\uFF0C\u4E0D\u904E\u56E0\u70BA\u73FE\u4EE3\u7684TCP/IP\u5806\u758A\u6C92\u6709\u4E0A\u9762\u6240\u8FF0\u7684\u74F6\u9838\uFF0C\u56E0\u6B64\u4ECB\u65BCSYN flood\u8207\u5176\u5B83\u7A2E\u57FA\u65BC\u901A\u9053\u5BB9\u91CF\u985E\u578B\u7684\u653B\u64CA\u61C9\u8A72\u6703\u53EA\u6709\u5F88\u5C0F\u6216\u5E7E\u4E4E\u6C92\u6709\u5DEE\u5225\u3002 \u4EA6\u53EF\u4EE5\u88AB\u653B\u64CA\u8005\u6240\u5229\u7528\uFF0C\u4EE5\u53D6\u4EE3\u5BA2\u6236\u7AEF\u6A5F\u5668\u3002SYN\u8BB2\u7684\u662F\u9ED1\u5BA2\u5229\u7528TCP\u534F\u8BAE\u53D1\u9001\u5927\u91CF\u7684\u534A\u8FDE\u63A5\u8BF7\u6C42\u53BB\u653B\u51FB\u76EE\u6807\u670D\u52A1\u5668\u6216\u8005\u4E3B\u673A\uFF0C\u81F4\u4F7F\u76EE\u6807\u670D\u52A1\u5668\u53D1\u751F\u62D2\u7EDD\u670D\u52A1\uFF0C\u6216\u8005\u84DD\u5C4F\u3002"@zh . . . . "SYN flood"@cs . . "SYN flood"@ja . . "Ein SYN-Flood ist eine Form der Denial-of-Service-Attacke (DoS) auf Computersysteme. Der Angriff verwendet den Verbindungsaufbau des TCP-Transportprotokolls, um einzelne Dienste oder ganze Computer aus dem Netzwerk unerreichbar zu machen."@de . . "A SYN flood is a form of denial-of-service attack in which an attacker rapidly initiates a connection to a server without finalizing the connection. The server has to spend resources waiting for half-opened connections, which can consume enough resources to make the system unresponsive to legitimate traffic. The packet that the attacker sends is the SYN packet, a part of TCP's three-way handshake used to establish a connection."@en . . . . "Sebuah SYN flood adalah bentuk serangan penolakan layanan di mana penyerang dengan cepat memulai koneksi ke server tanpa menyelesaikan koneksi. Server harus menghabiskan sumber daya menunggu koneksi yang setengah terbuka, yang dapat menghabiskan sumber daya yang cukup untuk membuat sistem tidak responsif terhadap lalu lintas yang sah. Paket yang dikirimkan penyerang adalah paket SYN, bagian dari jabat tangan tiga arah TCP yang digunakan untuk membuat sambungan."@in . "SYN flood"@pl . "4321"^^ . . . . . "Il SYN flood \u00E8 un attacco di tipo denial of service nel quale un utente malevolo invia una serie di richieste SYN-TCP verso il sistema oggetto dell'attacco. Quando un client cerca di iniziare una connessione TCP verso un server, il client e il server scambiano una serie di messaggi che di norma \u00E8 cos\u00EC articolata: Tale processo \u00E8 chiamato TCP three-way handshake (handshake a tre vie) e costituisce il fondamento per ogni connessione stabilita utilizzando i protocolli TCP/IP. Tecnica 1 Tecnica 2"@it . . "Le SYN flood est une attaque informatique visant \u00E0 atteindre un d\u00E9ni de service. Elle s'applique dans le cadre du protocole TCP et consiste \u00E0 envoyer une succession de requ\u00EAtes SYN vers la cible."@fr . . . . "Il SYN flood \u00E8 un attacco di tipo denial of service nel quale un utente malevolo invia una serie di richieste SYN-TCP verso il sistema oggetto dell'attacco. Quando un client cerca di iniziare una connessione TCP verso un server, il client e il server scambiano una serie di messaggi che di norma \u00E8 cos\u00EC articolata: 1. \n* Il client richiede una connessione inviando un messaggio SYN (synchronize) al server e cos\u00EC facendo richiedere di sincronizzare la Sequence Number (segmento di 32-bit del TCP che serve per riconoscere il pacchetto inviato). 2. \n* Il server acknowledges, cio\u00E8 risponde a tale richiesta inviando un messaggio SYN-ACK al client e inviando la Sequence Number ricevuta incrementata di una unit\u00E0. Il server inoltre alloca dello spazio in memoria salvando la request fatta dal client. 3. \n* Il client risponde con un ACK e il server dealloca la request fatta al punto 1 dal client consentendo di fatto la riuscita della connessione in maniera corretta. Tale processo \u00E8 chiamato TCP three-way handshake (handshake a tre vie) e costituisce il fondamento per ogni connessione stabilita utilizzando i protocolli TCP/IP. Nel SYN flood la connessione segue il principio del three-way-handshake modificato in modo da mettere fuori uso i servizi internet destinati agli utenti. Nello specifico l'attaccante pu\u00F2 ricorrere a due tecniche distinte per mettere a segno il proprio attacco che vengono analizzate qui di seguito: Tecnica 1 1. \n* L'attaccante richiede una connessione al server utilizzando lo spoofing, ossia camuffa il proprio indirizzo IP con un indirizzo IP diverso. 2. \n* Il server risponde alla richiesta inviata dal client malevolo con un SYN-ACK all'indirizzo IP non corretto. A questo punto la connessione rimarr\u00E0 aperta (ovvero si trover\u00E0 nello stato half-open) perch\u00E9 non ricever\u00E0 mai il messaggio di ACK da parte del client. Tecnica 2 1. \n* L'attaccante richiede una connessione al server inviando una richiesta SYN. 2. \n* Il server risponde alla richiesta inviata dal client con un SYN-ACK. In questo caso il client decide intenzionalmente di non rispondere, e dunque di instaurare una connessione con il server, lasciando di fatto aperta la connessione. Non avendo chiuso le connessioni, il server si trova in tutte e due i casi in uno stato vulnerabile ad ogni possibile attacco malevolo. Molte volte il SYN flood viene utilizzato solo come fase iniziale di altri attacchi molto pi\u00F9 sofisticati."@it . "SYN-Flood"@de . . . . . "SYN flood ou ataque SYN \u00E9 uma forma de ataque de nega\u00E7\u00E3o de servi\u00E7o (tamb\u00E9m conhecido como Denial of Service - DoS) em sistemas computadorizados, na qual o atacante envia uma sequ\u00EAncia de requisi\u00E7\u00F5es SYN para um sistema-alvo visando uma sobrecarga direta na camada de transporte e indireta na camada de aplica\u00E7\u00E3o do modelo OSI. Quando um cliente tenta come\u00E7ar uma conex\u00E3o TCP com um servidor, o cliente e o servidor trocam um s\u00E9rie de mensagens, que normalmente s\u00E3o assim: Isto \u00E9 o chamado aperto de m\u00E3o em tr\u00EAs etapas (Three-Way Handshake)."@pt . . . . "SYN Flood"@pt . "SYN-\u0444\u043B\u0443\u0434 \u2014 \u043E\u0434\u043D\u0430 \u0438\u0437 \u0440\u0430\u0437\u043D\u043E\u0432\u0438\u0434\u043D\u043E\u0441\u0442\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u044B\u0445 \u0430\u0442\u0430\u043A \u0442\u0438\u043F\u0430 \u043E\u0442\u043A\u0430\u0437 \u043E\u0442 \u043E\u0431\u0441\u043B\u0443\u0436\u0438\u0432\u0430\u043D\u0438\u044F, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u0437\u0430\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0432 \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0435 \u0431\u043E\u043B\u044C\u0448\u043E\u0433\u043E \u043A\u043E\u043B\u0438\u0447\u0435\u0441\u0442\u0432\u0430 SYN-\u0437\u0430\u043F\u0440\u043E\u0441\u043E\u0432 (\u0437\u0430\u043F\u0440\u043E\u0441\u043E\u0432 \u043D\u0430 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0435 \u043F\u043E \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0443 TCP) \u0432 \u0434\u043E\u0441\u0442\u0430\u0442\u043E\u0447\u043D\u043E \u043A\u043E\u0440\u043E\u0442\u043A\u0438\u0439 \u0441\u0440\u043E\u043A (RFC 4987). \u0421\u043E\u0433\u043B\u0430\u0441\u043D\u043E \u043F\u0440\u043E\u0446\u0435\u0441\u0441\u0443 \u00AB\u0442\u0440\u0451\u0445\u043A\u0440\u0430\u0442\u043D\u043E\u0433\u043E \u0440\u0443\u043A\u043E\u043F\u043E\u0436\u0430\u0442\u0438\u044F\u00BB TCP, \u043A\u043B\u0438\u0435\u043D\u0442 \u043F\u043E\u0441\u044B\u043B\u0430\u0435\u0442 \u043F\u0430\u043A\u0435\u0442 \u0441 \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D\u043D\u044B\u043C \u0444\u043B\u0430\u0433\u043E\u043C SYN (synchronize). \u0412 \u043E\u0442\u0432\u0435\u0442 \u043D\u0430 \u043D\u0435\u0433\u043E \u0441\u0435\u0440\u0432\u0435\u0440 \u0434\u043E\u043B\u0436\u0435\u043D \u043E\u0442\u0432\u0435\u0442\u0438\u0442\u044C \u043A\u043E\u043C\u0431\u0438\u043D\u0430\u0446\u0438\u0435\u0439 \u0444\u043B\u0430\u0433\u043E\u0432 SYN+ACK (acknowledges). \u041F\u043E\u0441\u043B\u0435 \u044D\u0442\u043E\u0433\u043E \u043A\u043B\u0438\u0435\u043D\u0442 \u0434\u043E\u043B\u0436\u0435\u043D \u043E\u0442\u0432\u0435\u0442\u0438\u0442\u044C \u043F\u0430\u043A\u0435\u0442\u043E\u043C \u0441 \u0444\u043B\u0430\u0433\u043E\u043C ACK, \u043F\u043E\u0441\u043B\u0435 \u0447\u0435\u0433\u043E \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u0435 \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D\u043D\u044B\u043C. \u041F\u0440\u0438\u043D\u0446\u0438\u043F \u0430\u0442\u0430\u043A\u0438 \u0437\u0430\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0432 \u0442\u043E\u043C, \u0447\u0442\u043E \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A, \u043F\u043E\u0441\u044B\u043B\u0430\u044F SYN-\u0437\u0430\u043F\u0440\u043E\u0441\u044B, \u043F\u0435\u0440\u0435\u043F\u043E\u043B\u043D\u044F\u0435\u0442 \u043D\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 (\u0446\u0435\u043B\u0438 \u0430\u0442\u0430\u043A\u0438) \u043E\u0447\u0435\u0440\u0435\u0434\u044C \u043D\u0430 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u044F. \u041F\u0440\u0438 \u044D\u0442\u043E\u043C \u043E\u043D \u0438\u0433\u043D\u043E\u0440\u0438\u0440\u0443\u0435\u0442 SYN+ACK \u043F\u0430\u043A\u0435\u0442\u044B \u0446\u0435\u043B\u0438, \u043D\u0435 \u0432\u044B\u0441\u044B\u043B\u0430\u044F \u043E\u0442\u0432\u0435\u0442\u043D\u044B\u0435 \u043F\u0430\u043A\u0435\u0442\u044B, \u043B\u0438\u0431\u043E \u043F\u043E\u0434\u0434\u0435\u043B\u044B\u0432\u0430\u0435\u0442 \u0437\u0430\u0433\u043E\u043B\u043E\u0432\u043E\u043A \u043F\u0430\u043A\u0435\u0442\u0430 \u0442\u0430\u043A\u0438\u043C \u043E\u0431\u0440\u0430\u0437\u043E\u043C, \u0447\u0442\u043E \u043E\u0442\u0432\u0435\u0442\u043D\u044B\u0439 SYN+ACK \u043E\u0442\u043F\u0440\u0430\u0432\u043B\u044F\u0435\u0442\u0441\u044F \u043D\u0430 \u043D\u0435\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044E\u0449\u0438\u0439 \u0430\u0434\u0440\u0435\u0441. \u0412 \u043E\u0447\u0435\u0440\u0435\u0434\u0438 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0439 \u043F\u043E\u044F\u0432\u043B\u044F\u044E\u0442\u0441\u044F \u0442\u0430\u043A \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u043C\u044B\u0435 \u043F\u043E\u043B\u0443\u043E\u0442\u043A\u0440\u044B\u0442\u044B\u0435 \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u044F (\u0430\u043D\u0433\u043B. half-open connection), \u043E\u0436\u0438\u0434\u0430\u044E\u0449\u0438\u0435 \u043F\u043E\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u044F \u043E\u0442 \u043A\u043B\u0438\u0435\u043D\u0442\u0430. \u041F\u043E \u0438\u0441\u0442\u0435\u0447\u0435\u043D\u0438\u0438 \u043E\u043F\u0440\u0435\u0434\u0435\u043B\u0435\u043D\u043D\u043E\u0433\u043E \u0442\u0430\u0439\u043C-\u0430\u0443\u0442\u0430 \u044D\u0442\u0438 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u044F \u043E\u0442\u0431\u0440\u0430\u0441\u044B\u0432\u0430\u044E\u0442\u0441\u044F. \u0417\u0430\u0434\u0430\u0447\u0430 \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A\u0430 \u0437\u0430\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0432 \u0442\u043E\u043C, \u0447\u0442\u043E\u0431\u044B \u043F\u043E\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044C \u043E\u0447\u0435\u0440\u0435\u0434\u044C \u0437\u0430\u043F\u043E\u043B\u043D\u0435\u043D\u043D\u043E\u0439 \u0442\u0430\u043A\u0438\u043C \u043E\u0431\u0440\u0430\u0437\u043E\u043C, \u0447\u0442\u043E\u0431\u044B \u043D\u0435 \u0434\u043E\u043F\u0443\u0441\u0442\u0438\u0442\u044C \u043D\u043E\u0432\u044B\u0445 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0439. \u0418\u0437-\u0437\u0430 \u044D\u0442\u043E\u0433\u043E \u043A\u043B\u0438\u0435\u043D\u0442\u044B, \u043D\u0435 \u044F\u0432\u043B\u044F\u044E\u0449\u0438\u0435\u0441\u044F \u0437\u043B\u043E\u0443\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u0438\u043A\u0430\u043C\u0438, \u043D\u0435 \u043C\u043E\u0433\u0443\u0442 \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u0438\u0442\u044C \u0441\u0432\u044F\u0437\u044C, \u043B\u0438\u0431\u043E \u0443\u0441\u0442\u0430\u043D\u0430\u0432\u043B\u0438\u0432\u0430\u044E\u0442 \u0435\u0451 \u0441 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043D\u043D\u044B\u043C\u0438 \u0437\u0430\u0434\u0435\u0440\u0436\u043A\u0430\u043C\u0438. \u0410\u0442\u0430\u043A\u0430 \u043E\u0441\u043D\u043E\u0432\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u043D\u0430 \u0443\u044F\u0437\u0432\u0438\u043C\u043E\u0441\u0442\u0438 \u043E\u0433\u0440\u0430\u043D\u0438\u0447\u0435\u043D\u0438\u044F \u0440\u0435\u0441\u0443\u0440\u0441\u043E\u0432 \u043E\u043F\u0435\u0440\u0430\u0446\u0438\u043E\u043D\u043D\u043E\u0439 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u0434\u043B\u044F \u043F\u043E\u043B\u0443\u043E\u0442\u043A\u0440\u044B\u0442\u044B\u0445 \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u0439, \u043E\u043F\u0438\u0441\u0430\u043D\u043D\u043E\u0439 \u0432 1996 \u0433\u043E\u0434\u0443 \u0433\u0440\u0443\u043F\u043F\u043E\u0439 CERT, \u0441\u043E\u0433\u043B\u0430\u0441\u043D\u043E \u043A\u043E\u0442\u043E\u0440\u043E\u0439 \u043E\u0447\u0435\u0440\u0435\u0434\u044C \u0434\u043B\u044F \u0442\u0430\u043A\u0438\u0445 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0439 \u0431\u044B\u043B\u0430 \u043E\u0447\u0435\u043D\u044C \u043A\u043E\u0440\u043E\u0442\u043A\u043E\u0439 (\u043D\u0430\u043F\u0440\u0438\u043C\u0435\u0440, \u0432 Solaris \u0434\u043E\u043F\u0443\u0441\u043A\u0430\u043B\u043E\u0441\u044C \u043D\u0435 \u0431\u043E\u043B\u0435\u0435 \u0432\u043E\u0441\u044C\u043C\u0438 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0439), \u0430 \u0442\u0430\u0439\u043C-\u0430\u0443\u0442 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0439 \u2014 \u0434\u043E\u0441\u0442\u0430\u0442\u043E\u0447\u043D\u043E \u043F\u0440\u043E\u0434\u043E\u043B\u0436\u0438\u0442\u0435\u043B\u044C\u043D\u044B\u043C (\u043F\u043E RFC 1122 \u2014 3 \u043C\u0438\u043D\u0443\u0442\u044B)."@ru . . . . "SYN flood"@in . "Een SYN-flood (synchronous flood) is een DoS-aanval. Bij een SYN-flood wordt een groot aantal verbindingsaanvragen gedaan door een groot aantal SYN-pakketten met foute bron-IP-adressen naar een server te sturen. Voor iedere aanvraag reserveert een server bronnen (bijvoorbeeld geheugen of een socket). Als de server vervolgens een bericht terugstuurt om aan te geven dat hij klaar is voor de verbinding, wordt dit bericht naar het verkeerde IP-adres gestuurd. De server krijgt vervolgens geen bericht terug en terwijl de server op antwoord wacht, blijven de gereserveerde bronnen in gebruik. Als er een groot aantal van dit soort aanvragen vlak na elkaar wordt verzonden kan dit ertoe leiden dat de server niet langer voor \"echte\" aanvragen bereikbaar is of dat de server zelfs crasht."@nl . . "236095"^^ . "\u0397 \u03B5\u03C0\u03AF\u03B8\u03B5\u03C3\u03B7 SYN flood \u03B5\u03AF\u03BD\u03B1\u03B9 \u03AD\u03BD\u03B1 \u03B5\u03AF\u03B4\u03BF\u03C2 \u03B5\u03C0\u03AF\u03B8\u03B5\u03C3\u03B7\u03C2 \u03AC\u03C1\u03BD\u03B7\u03C3\u03B7\u03C2 \u03C0\u03C1\u03CC\u03C3\u03B2\u03B1\u03C3\u03B7\u03C2 (DOS - Denial of Service) \u03BA\u03B1\u03C4\u03AC \u03C4\u03B7\u03BD \u03BF\u03C0\u03BF\u03AF\u03B1 \u03BF \u03B5\u03C0\u03B9\u03C4\u03B9\u03B8\u03AD\u03BC\u03B5\u03BD\u03BF\u03C2 \u03B1\u03C0\u03BF\u03C3\u03C4\u03AD\u03BB\u03BB\u03B5\u03B9 \u03C0\u03BF\u03BB\u03BB\u03B1\u03C0\u03BB\u03AD\u03C2 \u03B1\u03B9\u03C4\u03AE\u03C3\u03B5\u03B9\u03C2 SYN \u03C0\u03C1\u03BF\u03C2 \u03C4\u03BF \u03B8\u03CD\u03BC\u03B1."@el . . . . . . . "SYN flood\u6216\u7A31SYN\u6D2A\u6C34\u3001SYN\u6D2A\u6CDB\u662F\u4E00\u7A2E\u963B\u65B7\u670D\u52D9\u653B\u64CA\uFF0C\u8D77\u56E0\u65BC\u653B\u64CA\u8005\u50B3\u9001\u4E00\u7CFB\u5217\u7684SYN\u8ACB\u6C42\u5230\u76EE\u6A19\u7CFB\u7D71\u3002 \u7576\u7528\u6236\u7AEF\u8A66\u8457\u8207\u4F3A\u670D\u5668\u9593\u5EFA\u7ACBTCP\u9023\u7DDA\u6642\uFF0C\u6B63\u5E38\u60C5\u6CC1\u4E0B\u7528\u6236\u7AEF\u8207\u4F3A\u670D\u5668\u7AEF\u4EA4\u63DB\u4E00\u7CFB\u5217\u7684\u4FE1\u606F\u5982\u4E0B\uFF1A 1. \n* \u7528\u6236\u7AEF\u900F\u904E\u50B3\u9001SYN\u540C\u6B65\uFF08synchronize\uFF09\u4FE1\u606F\u5230\u4F3A\u670D\u5668\u8981\u6C42\u5EFA\u7ACB\u9023\u7DDA\u3002 2. \n* \u4F3A\u670D\u5668\u900F\u904E\u97FF\u61C9\u7528\u6236\u7AEFSYN-ACK\u4EE5\u6284\u6536\uFF08acknowledge\uFF09\u8ACB\u6C42\u3002 3. \n* \u7528\u6236\u7AEF\u7B54\u61C9ACK\uFF0C\u9023\u7DDA\u96A8\u4E4B\u5EFA\u7ACB\u3002 \u9019\u5373\u662F\u6240\u8B02TCP\u4E09\u5411\u4EA4\u63E1\uFF0C\u4E26\u4E14\u9019\u662F\u6BCF\u500B\u4F7F\u7528TCP\u50B3\u8F38\u5354\u8B70\u5EFA\u7ACB\u9023\u7DDA\u7684\u57FA\u790E\u3002 SYN flood\u662F\u4E00\u7A2E\u5EE3\u70BA\u4EBA\u77E5\u7684\u653B\u64CA\uFF0C\u4E00\u822C\u5C0D\u73FE\u4EE3\u7DB2\u8DEF\u4E0D\u592A\u6709\u6548\u3002\u9019\u7A2E\u653B\u64CA\u53EA\u6709\u5728\u4F3A\u670D\u5668\u5728\u6536\u5230SYN\u5F8C\u5206\u914D\u8CC7\u6E90\uFF0C\u4F46\u5728\u6536\u5230ACK\u4E4B\u524D\u9019\u500B\u5340\u6BB5\u6709\u6548\u3002 \u4EA6\u53EF\u4EE5\u88AB\u653B\u64CA\u8005\u6240\u5229\u7528\uFF0C\u4EE5\u53D6\u4EE3\u5BA2\u6236\u7AEF\u6A5F\u5668\u3002SYN\u8BB2\u7684\u662F\u9ED1\u5BA2\u5229\u7528TCP\u534F\u8BAE\u53D1\u9001\u5927\u91CF\u7684\u534A\u8FDE\u63A5\u8BF7\u6C42\u53BB\u653B\u51FB\u76EE\u6807\u670D\u52A1\u5668\u6216\u8005\u4E3B\u673A\uFF0C\u81F4\u4F7F\u76EE\u6807\u670D\u52A1\u5668\u53D1\u751F\u62D2\u7EDD\u670D\u52A1\uFF0C\u6216\u8005\u84DD\u5C4F\u3002"@zh . "SYN flood"@fr . . "SYN flood"@el . "SYN-\u0444\u043B\u0443\u0434"@uk . . . "Z\u00E1plava pakety SYN neboli SYN-flood je druh \u00FAtoku ozna\u010Dovan\u00FD jako Denial of Service. \u00DAto\u010Dn\u00EDk po\u0161le posloupnost paket\u016F s p\u0159\u00EDznakem SYN c\u00EDlov\u00E9mu po\u010D\u00EDta\u010Di, ale ji\u017E d\u00E1le neodpov\u00EDd\u00E1. Pokud se klient pokou\u0161\u00ED nav\u00E1zat spojen\u00ED se serverem protokolem TCP, klient a server si za norm\u00E1ln\u00EDch okolnost\u00ED vym\u011Bn\u00ED t\u0159i TCP pakety: 1. \n* Klient po\u0161le na server paket s p\u0159\u00EDznakem SYN (synchronizovat) 2. \n* Server uzn\u00E1 (acknowledge) \u017E\u00E1dost o synchronizaci a po\u0161le paket s p\u0159\u00EDznaky SYN a ACK 3. \n* Klient po\u0161le paket s p\u0159\u00EDznakem ACK"@cs . . "SYN-\u0444\u043B\u0443\u0434"@ru . . . . "\u0397 \u03B5\u03C0\u03AF\u03B8\u03B5\u03C3\u03B7 SYN flood \u03B5\u03AF\u03BD\u03B1\u03B9 \u03AD\u03BD\u03B1 \u03B5\u03AF\u03B4\u03BF\u03C2 \u03B5\u03C0\u03AF\u03B8\u03B5\u03C3\u03B7\u03C2 \u03AC\u03C1\u03BD\u03B7\u03C3\u03B7\u03C2 \u03C0\u03C1\u03CC\u03C3\u03B2\u03B1\u03C3\u03B7\u03C2 (DOS - Denial of Service) \u03BA\u03B1\u03C4\u03AC \u03C4\u03B7\u03BD \u03BF\u03C0\u03BF\u03AF\u03B1 \u03BF \u03B5\u03C0\u03B9\u03C4\u03B9\u03B8\u03AD\u03BC\u03B5\u03BD\u03BF\u03C2 \u03B1\u03C0\u03BF\u03C3\u03C4\u03AD\u03BB\u03BB\u03B5\u03B9 \u03C0\u03BF\u03BB\u03BB\u03B1\u03C0\u03BB\u03AD\u03C2 \u03B1\u03B9\u03C4\u03AE\u03C3\u03B5\u03B9\u03C2 SYN \u03C0\u03C1\u03BF\u03C2 \u03C4\u03BF \u03B8\u03CD\u03BC\u03B1."@el . . "SYN flood"@en . "Ein SYN-Flood ist eine Form der Denial-of-Service-Attacke (DoS) auf Computersysteme. Der Angriff verwendet den Verbindungsaufbau des TCP-Transportprotokolls, um einzelne Dienste oder ganze Computer aus dem Netzwerk unerreichbar zu machen."@de . . "SYN flood\u653B\u6483 (\u30B7\u30F3\u30FB\u30D5\u30E9\u30C3\u30C9\u3053\u3046\u3052\u304D) \u3068\u306F\u3001\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u306B\u304A\u3051\u308BDoS\u653B\u6483\uFF08\u30B5\u30FC\u30D3\u30B9\u62D2\u5426\u653B\u6483\uFF09\u306E\u3072\u3068\u3064\u3002\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u4E0A\u306B\u516C\u958B\u3055\u308C\u3066\u3044\u308B\u30A6\u30A7\u30D6\u30B5\u30FC\u30D0\u306A\u3069\u306E\u8CA0\u8377\u3092\u5897\u5927\u3055\u305B\u3001\u5BFE\u8C61\u3068\u306A\u308B\u30B5\u30A4\u30C8\u3092\u4E00\u6642\u7684\u306B\u5229\u7528\u4E0D\u80FD\u306B\u9665\u3089\u305B\u3066\u3057\u307E\u3046\u52B9\u679C\u304C\u3042\u308B\u3002"@ja . "SYN flood ou ataque SYN \u00E9 uma forma de ataque de nega\u00E7\u00E3o de servi\u00E7o (tamb\u00E9m conhecido como Denial of Service - DoS) em sistemas computadorizados, na qual o atacante envia uma sequ\u00EAncia de requisi\u00E7\u00F5es SYN para um sistema-alvo visando uma sobrecarga direta na camada de transporte e indireta na camada de aplica\u00E7\u00E3o do modelo OSI. Quando um cliente tenta come\u00E7ar uma conex\u00E3o TCP com um servidor, o cliente e o servidor trocam um s\u00E9rie de mensagens, que normalmente s\u00E3o assim: \n* O cliente requisita uma conex\u00E3o enviando um SYN (synchronize) ao servidor. \n* O servidor confirma esta requisi\u00E7\u00E3o mandando um SYN-ACK(acknowledge) de volta ao cliente. \n* O cliente por sua vez responde com um , e a conex\u00E3o est\u00E1 estabelecida. Isto \u00E9 o chamado aperto de m\u00E3o em tr\u00EAs etapas (Three-Way Handshake). Um cliente malicioso, que implemente intencionalmente um protocolo TCP errado e incompleto, pode n\u00E3o mandar esta \u00FAltima mensagem ACK. O servidor ir\u00E1 esperar por isso por um tempo, j\u00E1 que um simples congestionamento de rede pode ser a causa do ACK em falta. Esta chamada conex\u00E3o semi-aberta explora a boa-f\u00E9 do protocolo TCP que espera por um certo tempo e algumas tentativas de restabelecimento de um sinal ACK v\u00E1lido para retomar a comunica\u00E7\u00E3o. A resposta maliciosa ao comando SYN gerada pelo cliente pode ocupar recursos no servidor (mem\u00F3ria e processamento) ou causar preju\u00EDzos para empresas usando softwares licenciados por conex\u00E3o (aumento de conex\u00F5es \"ativas\"). Pode ser poss\u00EDvel ocupar todos os recursos da m\u00E1quina, com pacotes SYN. Uma vez que todos os recursos estejam ocupados, nenhuma nova conex\u00E3o (leg\u00EDtima ou n\u00E3o) pode ser feita, resultando em nega\u00E7\u00E3o de servi\u00E7o. Alguns podem funcionar mal ou at\u00E9 mesmo travar se ficarem sem recursos desta maneira. Algumas contra-medidas para este ataque s\u00E3o os SYN cookies. Apenas m\u00E1quinas Sun e Linux usam SYN cookies. Ao contr\u00E1rio do que muitos pensam, n\u00E3o se resolve nega\u00E7\u00E3o de servi\u00E7o por SYN Flood limitando conex\u00F5es por minuto (como usar o m\u00F3dulo limit ou recent do iptables), pois as conex\u00F5es excedentes seriam descartadas pelo firewall, sendo que desta forma o pr\u00F3prio firewall tiraria o servi\u00E7o do ar. Se eu, por exemplo, limito as conex\u00F5es SYN a 10/seg, um atacante precisa apenas manter uma taxa de SYNs superior a 10/s para que conex\u00F5es leg\u00EDtimas sejam descartadas pelo firewall. O firewall tornou a tarefa do atacante ainda mais f\u00E1cil. Em \"Iptables protege contra SYN Flood?\" tem uma boa descri\u00E7\u00E3o dos motivos pelos quais uma configura\u00E7\u00E3o de firewall n\u00E3o resolve. Um ataque de SYN Flood \u00E9 feito com os IPs forjados (spoof), para que o atacante n\u00E3o receba os ACKs de suas falsas solicita\u00E7\u00F5es."@pt . "Le SYN flood est une attaque informatique visant \u00E0 atteindre un d\u00E9ni de service. Elle s'applique dans le cadre du protocole TCP et consiste \u00E0 envoyer une succession de requ\u00EAtes SYN vers la cible."@fr . "1077690065"^^ . "SYN-\u0444\u043B\u0443\u0434 \u2014 \u043E\u0434\u043D\u0430 \u0438\u0437 \u0440\u0430\u0437\u043D\u043E\u0432\u0438\u0434\u043D\u043E\u0441\u0442\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u044B\u0445 \u0430\u0442\u0430\u043A \u0442\u0438\u043F\u0430 \u043E\u0442\u043A\u0430\u0437 \u043E\u0442 \u043E\u0431\u0441\u043B\u0443\u0436\u0438\u0432\u0430\u043D\u0438\u044F, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u0437\u0430\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0432 \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0435 \u0431\u043E\u043B\u044C\u0448\u043E\u0433\u043E \u043A\u043E\u043B\u0438\u0447\u0435\u0441\u0442\u0432\u0430 SYN-\u0437\u0430\u043F\u0440\u043E\u0441\u043E\u0432 (\u0437\u0430\u043F\u0440\u043E\u0441\u043E\u0432 \u043D\u0430 \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u0435 \u043F\u043E \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0443 TCP) \u0432 \u0434\u043E\u0441\u0442\u0430\u0442\u043E\u0447\u043D\u043E \u043A\u043E\u0440\u043E\u0442\u043A\u0438\u0439 \u0441\u0440\u043E\u043A (RFC 4987). \u0421\u043E\u0433\u043B\u0430\u0441\u043D\u043E \u043F\u0440\u043E\u0446\u0435\u0441\u0441\u0443 \u00AB\u0442\u0440\u0451\u0445\u043A\u0440\u0430\u0442\u043D\u043E\u0433\u043E \u0440\u0443\u043A\u043E\u043F\u043E\u0436\u0430\u0442\u0438\u044F\u00BB TCP, \u043A\u043B\u0438\u0435\u043D\u0442 \u043F\u043E\u0441\u044B\u043B\u0430\u0435\u0442 \u043F\u0430\u043A\u0435\u0442 \u0441 \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D\u043D\u044B\u043C \u0444\u043B\u0430\u0433\u043E\u043C SYN (synchronize). \u0412 \u043E\u0442\u0432\u0435\u0442 \u043D\u0430 \u043D\u0435\u0433\u043E \u0441\u0435\u0440\u0432\u0435\u0440 \u0434\u043E\u043B\u0436\u0435\u043D \u043E\u0442\u0432\u0435\u0442\u0438\u0442\u044C \u043A\u043E\u043C\u0431\u0438\u043D\u0430\u0446\u0438\u0435\u0439 \u0444\u043B\u0430\u0433\u043E\u0432 SYN+ACK (acknowledges). \u041F\u043E\u0441\u043B\u0435 \u044D\u0442\u043E\u0433\u043E \u043A\u043B\u0438\u0435\u043D\u0442 \u0434\u043E\u043B\u0436\u0435\u043D \u043E\u0442\u0432\u0435\u0442\u0438\u0442\u044C \u043F\u0430\u043A\u0435\u0442\u043E\u043C \u0441 \u0444\u043B\u0430\u0433\u043E\u043C ACK, \u043F\u043E\u0441\u043B\u0435 \u0447\u0435\u0433\u043E \u0441\u043E\u0435\u0434\u0438\u043D\u0435\u043D\u0438\u0435 \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D\u043D\u044B\u043C."@ru . . "A SYN flood is a form of denial-of-service attack in which an attacker rapidly initiates a connection to a server without finalizing the connection. The server has to spend resources waiting for half-opened connections, which can consume enough resources to make the system unresponsive to legitimate traffic. The packet that the attacker sends is the SYN packet, a part of TCP's three-way handshake used to establish a connection."@en . . . . "SYN flood \u2013 jeden z popularnych atak\u00F3w w sieciach komputerowych. Jego celem jest g\u0142\u00F3wnie zablokowanie us\u0142ug danego serwera (DoS). Do przeprowadzenia ataku wykorzystywany jest protok\u00F3\u0142 TCP."@pl . "SYN flood\u653B\u6483 (\u30B7\u30F3\u30FB\u30D5\u30E9\u30C3\u30C9\u3053\u3046\u3052\u304D) \u3068\u306F\u3001\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u306B\u304A\u3051\u308BDoS\u653B\u6483\uFF08\u30B5\u30FC\u30D3\u30B9\u62D2\u5426\u653B\u6483\uFF09\u306E\u3072\u3068\u3064\u3002\u30A4\u30F3\u30BF\u30FC\u30CD\u30C3\u30C8\u4E0A\u306B\u516C\u958B\u3055\u308C\u3066\u3044\u308B\u30A6\u30A7\u30D6\u30B5\u30FC\u30D0\u306A\u3069\u306E\u8CA0\u8377\u3092\u5897\u5927\u3055\u305B\u3001\u5BFE\u8C61\u3068\u306A\u308B\u30B5\u30A4\u30C8\u3092\u4E00\u6642\u7684\u306B\u5229\u7528\u4E0D\u80FD\u306B\u9665\u3089\u305B\u3066\u3057\u307E\u3046\u52B9\u679C\u304C\u3042\u308B\u3002"@ja . "Z\u00E1plava pakety SYN neboli SYN-flood je druh \u00FAtoku ozna\u010Dovan\u00FD jako Denial of Service. \u00DAto\u010Dn\u00EDk po\u0161le posloupnost paket\u016F s p\u0159\u00EDznakem SYN c\u00EDlov\u00E9mu po\u010D\u00EDta\u010Di, ale ji\u017E d\u00E1le neodpov\u00EDd\u00E1. Pokud se klient pokou\u0161\u00ED nav\u00E1zat spojen\u00ED se serverem protokolem TCP, klient a server si za norm\u00E1ln\u00EDch okolnost\u00ED vym\u011Bn\u00ED t\u0159i TCP pakety: 1. \n* Klient po\u0161le na server paket s p\u0159\u00EDznakem SYN (synchronizovat) 2. \n* Server uzn\u00E1 (acknowledge) \u017E\u00E1dost o synchronizaci a po\u0161le paket s p\u0159\u00EDznaky SYN a ACK 3. \n* Klient po\u0161le paket s p\u0159\u00EDznakem ACK Toto se naz\u00FDv\u00E1 t\u0159\u00EDcestn\u00E9 nav\u00E1z\u00E1n\u00ED spojen\u00ED (three-way handshake) a jedn\u00E1 se o z\u00E1klad navazov\u00E1n\u00ED spojen\u00ED protokolem TCP."@cs .