Corpus ID: 10119066

A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks

@inproceedings{Sun2007ANR,
  title={A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks},
  author={Changhua Sun and Jindou Fan and L. Shi and Bin Liu},
  year={2007}
}
  • Changhua Sun, Jindou Fan, +1 author Bin Liu
  • Published 2007
  • Distributed Denial-of-Service (DDoS) attack remains a serious problem on the Internet today, as it takes advantage of the lack of authenticity in the IP protocol, destination oriented routing, and stateless nature of the Internet. Among various DDoS attacks, the TCP SYN flooding [1] is the most commonly-used one. It exploits TCP’s three-way handshake mechanism and TCP’s limitation in maintaining half-open connections. When a server receives a SYN packet, it returns a SYN/ACK packet and… CONTINUE READING
    17 Citations
    Detecting SYN Flooding Agents under Any Type of IP Spoofing
    • 27
    More Accurate and Fast SYN Flood Detection
    • 12
    A real-time method for detecting internet-wide SYN flooding attacks
    • Lihua Miao, W. Ding, J. Gong
    • Computer Science
    • The 21st IEEE International Workshop on Local and Metropolitan Area Networks
    • 2015
    • 9
    A Robust Scheme to Detect SYN Flooding Attacks
    • 21
    • PDF
    Router based detection for low-rate agents of DDoS attack
    • 12
    • PDF
    SACK2: effective SYN flood detection against skillful spoofs
    • 8
    Review of syn-flooding attack detection mechanism
    • 25
    • PDF

    References

    SHOWING 1-7 OF 7 REFERENCES
    Resisting SYN Flood DoS Attacks with a SYN Cache
    • J. Lemon
    • Computer Science, Engineering
    • BSDCon
    • 2002
    • 220
    • PDF
    Detecting SYN flooding attacks
    • H. Wang, D. Zhang, K. Shin
    • Computer Science
    • Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
    • 2002
    • 662
    • PDF
    TCP SYN Flooding Attacks and Common Mitigations
    • W. Eddy
    • Geography, Computer Science
    • RFC
    • 2007
    • 280
    • PDF
    Space/time trade-offs in hash coding with allowable errors
    • 6,718
    • PDF
    Efficient Hardware Hashing Functions for High Performance Computers
    • 191
    • PDF
    Intentional dropping: a novel scheme for SYN flooding mitigation
    • 7
    J . Lemon , “ Resisting SYN flood DoS attacks with a SYN cache , ” in USENIX BSDCon , 2002 . [ 4 ] “ SYN cookies . ” [ Online ]