A Robust Scheme to Detect SYN Flooding Attacks
@article{Sun2007ARS, title={A Robust Scheme to Detect SYN Flooding Attacks}, author={Changhua Sun and Jindou Fan and Bin Liu}, journal={2007 Second International Conference on Communications and Networking in China}, year={2007}, pages={397-401} }
We propose a more robust scheme to detect SYN flooding attacks. Existing methods for detecting SYN flooding are based on the protocol behavior of TCP SYN-FIN (RST) or SYN-ACK pairs, as normally the number of SYN packets is equal to that of FIN (added with RST) packets, or ACK packets in the handshake. When SYN flood starts, there will be more SYN packets. However, the attacker can avoid the detection by sending the FIN or RST packets (ACK packets) in conjunction with the SYN packets. To make… CONTINUE READING
Figures, Tables, and Topics from this paper
21 Citations
More Accurate and Fast SYN Flood Detection
- Computer Science
- 2009 Proceedings of 18th International Conference on Computer Communications and Networks
- 2009
- 12
Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack
- Computer Science
- 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
- 2009
- 11
- Highly Influenced
A More Accurate Scheme to Detect SYN Flood Attacks
- Computer Science
- IEEE INFOCOM Workshops 2009
- 2009
- 10
- PDF
Analysing the influence of the DCBF data structure on the DoS attack detection
- Computer Science
- 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS)
- 2017
Wireless Intrusion Detection for defending against TCP SYN flooding attack and man-in-the-middle attack
- Computer Science
- 2009 International Conference on Machine Learning and Cybernetics
- 2009
- 10
ARM-CPD: Detecting SYN flooding attack by traffic prediction
- Computer Science
- 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology
- 2009
- 6
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
- Computer Science, Engineering
- ArXiv
- 2012
- 13
- PDF
References
SHOWING 1-10 OF 17 REFERENCES
Detecting SYN flooding attacks
- Computer Science
- Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
- 2002
- 662
- PDF
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing
- Computer Science
- International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)
- 2006
- 84
- PDF
Efficient Hardware Hashing Functions for High Performance Computers
- Computer Science
- IEEE Trans. Computers
- 1997
- 191
- PDF