Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,847 papers from all fields of science
Search
Sign In
Create Free Account
SYN cookies
Known as:
Syn cookie
, SYNcookie
, Tcp syncookies
Expand
SYN cookie is a technique used to resist SYN flood attacks. Daniel J. Bernstein, the technique's primary inventor, defines SYN cookies as "particular…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Comparison of operating system kernels
Cracking of wireless networks
Firewall (computing)
Load balancing (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
An experimental study on the applicability of SYN cookies to networked constrained devices
J. J. Echevarria
,
P. Garaizar
,
J. Legarda
Software, Practice & Experience
2018
Corpus ID: 3845843
The Internet protocol suite is increasingly used on devices with constrained resources that operate as both clients and servers…
Expand
2018
2018
DDoS Attack Detection Using Sliding Window Method
Lu Zhang
,
M. Qian
,
Yunbing Chi
2018
Corpus ID: 55569474
DDoS (Distributed Denial of Service) attack, with its simple, difficult to detect, destructive features, causes a huge threat to…
Expand
2009
2009
A More Accurate Scheme to Detect SYN Flood Attacks
Changhua Sun
,
Chengchen Hu
,
Yachao Zhou
,
Xin Xiao
,
B. Liu
IEEE INFOCOM Workshops
2009
Corpus ID: 16930263
We propose to use the SYN/ACK-CliACK pair's behavior to detect the various SYN flood attacks more accurately. The SYN/ACK packets…
Expand
2009
2009
A novel SYN Cookie method for TCP layer DDoS attack
B. Hang
,
R. Hu
International Conference on Future BioMedical…
2009
Corpus ID: 17000381
With the development of network, the issues of network security are rapidly becoming a serious problem, and the Denial of Service…
Expand
2008
2008
Comparison of operating system implementations of SYN flood defenses (Cookies)
C. Smith
,
A. Matrawy
Biennial Symposium on Communications
2008
Corpus ID: 32363132
In this paper, we report on our comparison of the operating system implementation of the most common defense against SYN flood…
Expand
2008
2008
A stateless approach to connection-oriented protocols
Alan Shieh
,
A. Myers
,
E. G. Sirer
TOCS
2008
Corpus ID: 11031248
Traditional operating system interfaces and network protocol implementations force some system state to be kept on both sides of…
Expand
2008
2008
Securing stateful grid servers through virtual server rotation
Matthew Smith
,
C. Schridde
,
Bernd Freisleben
IEEE International Symposium on High-Performance…
2008
Corpus ID: 2698087
The Grid computing paradigm is aimed at providing seamless access to different kinds of resources, such as compute clusters, data…
Expand
2008
2008
Network and Internet Vulnerabilities Computer Security Lecture 10
David Aspinall
2008
Corpus ID: 61254628
É General pattern in serious Internet incidents: 1. Someone finds an exploit (usually via software bug) 2. Exploit is seen in the…
Expand
2005
2005
Den svenska straffrättens syn på homosexuella handlingar mellan män - En rättshistorisk tillbakablick
Christofer Morales
2005
Corpus ID: 190994359
Sexuella handlingar mellan samkonade personer betraktades under den svenska medeltiden som en av de tre sodomitiska synderna, da…
Expand
2002
2002
Improving the functionality of syn cookies
A. Zúquete
Communications and Multimedia Security
2002
Corpus ID: 5429807
Current Linux kernels include a facility called TCP SYN cookies, conceived to face SYN flooding attacks. However, the current…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE