Select the check box for each test you want to run as part of a "Denial of Service Attack" test.
Running a Denial of Service Attack test could potentially disable access to shared files and printers on your network.
Below are descriptions of each type of Denial of Service attack that the test can detect.
Dead Gateway detection is used by the TCP component of Windows TCP/IP to detect the failure of the default gateway and to adjust the IP routing table to use the next default gateway (if multiple default gateways are configured).
Although helpful in specific circumstances, this automated detection and subsequent compensation is often not required and may put your system at risk for unwanted IP re-routes as a direct result of attacks from remote hackers. This can amount to intermittent Internet connectivity.
The NBNS (NetBIOS Name Server) protocol allows network peers to assist in managing machine name conflicts.
Since the protocol is unauthenticated, it could be easy to spoof by anyone with remote access to the configuration. A remote attacker could use the Name Conflict and Name Release mechanisms to cause another computer on a network to conclude that its name was in conflict with one or more peers. The machine may also be unable to register a name on the network and/or may relinquish a name it already registered. As a result, the machine does not respond to requests sent to the newly conflicted name.
This parameter determines the number of times TCP will retransmit a connect request (SYN) before aborting the attempt. The retransmission time-out is doubled with each successive retransmission in a given connect attempt.
An attacker can flood your PC with TCP SYN requests in a Denial of Service attack. With this is mind, an attacker can flood your computer with constant TCP SYN requests, thereby exhausting system ports and decreasing available network bandwidth.
Keep Alive Time designates how often your computer's TCP verifies that an idle connection is still intact. To do this, Keep-Alive packets are sent from the TCP at a rate designated by the configured Keep-Alive Time settings.
In certain instances, attackers may use this vulnerability to adversely affect network settings and communications by exhausting system ports and decreasing available network bandwidth.