Information
Attackers use SYN flood attacks to perform a denial of service attacked on a system by sending many SYN packets without completing the three way handshake. This will quickly use up slots in the kernel's half-open connection queue and prevent legitimate connections from succeeding. SYN cookies allow the system to keep accepting valid connections, even if under a denial of service attack.
Solution
Set the following parameter in the /etc/sysctl.conf file - net.ipv4.tcp_syncookies = 1 Run the following commands to set the active kernel parameters - # sysctl -w net.ipv4.tcp_syncookies=1
# sysctl -w net.ipv4.route.flush=1