<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.vasexperts.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.vasexperts.com/feed.php">
        <title>VAS Experts documentation dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos</title>
        <description></description>
        <link>https://wiki.vasexperts.com/</link>
        <image rdf:resource="https://wiki.vasexperts.com/lib/tpl/vaswiki/images/favicon.ico" />
       <dc:date>2026-04-06T03:17:23+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_description&amp;rev=1775221508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_synflood&amp;rev=1775221508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_udpflood&amp;rev=1775221508&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.vasexperts.com/lib/tpl/vaswiki/images/favicon.ico">
        <title>VAS Experts documentation</title>
        <link>https://wiki.vasexperts.com/</link>
        <url>https://wiki.vasexperts.com/lib/tpl/vaswiki/images/favicon.ico</url>
    </image>
    <item rdf:about="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_description&amp;rev=1775221508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-04-03T13:05:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>General Description</title>
        <link>https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_description&amp;rev=1775221508&amp;do=diff</link>
        <description>General Description



In a DoS attack, the attacker aims to mask the return (source) address so that it cannot be blocked by IP. Therefore, a DoS attack typically consists of bombarding the victim’s servers with individual packets that contain spoofed source addresses.</description>
    </item>
    <item rdf:about="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_synflood&amp;rev=1775221508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-04-03T13:05:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Protection Against SYN Flood Attack</title>
        <link>https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_synflood&amp;rev=1775221508&amp;do=diff</link>
        <description>Protection Against SYN Flood Attack


GUIInstruction
A SYN flood attack causes excessive resource consumption on the target system, because for every incoming SYN packet the system must allocate certain memory resources or generate a special SYN+ACK response containing a cryptographic cookie, perform session table lookups, etc. — in other words, consume significant CPU resources.</description>
    </item>
    <item rdf:about="https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_udpflood&amp;rev=1775221508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-04-03T13:05:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Protection Against UDP Flood</title>
        <link>https://wiki.vasexperts.com/doku.php?id=dpi:dpi_options:opt_ddos:ssg_ddos:ddos_dos:ddos_dos_udpflood&amp;rev=1775221508&amp;do=diff</link>
        <description>Protection Against UDP Flood



This type of attack is carried out using fragmented UDP packets. The target platform is forced to spend significant resources reassembling and analyzing these packets.

Protection is implemented by dropping protocol types that are not relevant to the protected site.  
Protocol filter configuration is described in the option</description>
    </item>
</rdf:RDF>
