Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,922,209 papers from all fields of science
Search
Sign In
Create Free Account
SYN cookies
Known as:
Syn cookie
, SYNcookie
, Tcp syncookies
Expand
SYN cookie is a technique used to resist SYN flood attacks. Daniel J. Bernstein, the technique's primary inventor, defines SYN cookies as "particular…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Comparison of operating system kernels
Cracking of wireless networks
Firewall (computing)
Load balancing (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Novel DDoS Floods Detection and Testing Approaches for Network Traffic based on Linux Techniques
Muhammad Tahir
,
Mingchu Li
,
Naeem Ayoub
,
Usman Shehzaib
,
A. A. Wagan
2018
Corpus ID: 3694461
In Today’s Digital World, the continuous interruption of users has affected Web Servers (WSVRs), through Distributed Denial-of…
Expand
2018
2018
DDoS Attack Detection Using Sliding Window Method
Lu Zhang
,
M. Qian
,
Yunbing Chi
2018
Corpus ID: 55569474
DDoS (Distributed Denial of Service) attack, with its simple, difficult to detect, destructive features, causes a huge threat to…
Expand
2016
2016
TCP based SYN Flood Attack - Analysis, Detection and Prevention
Hardik K. Molia
,
Sohil Gambhir
,
Mahesh D. Titiya
2016
Corpus ID: 212607159
— TCP - Transmission Control Protocol is a logical vehicle to transfer data between two processes running on two different…
Expand
2009
2009
A novel SYN Cookie method for TCP layer DDoS attack
B. Hang
,
R. Hu
International Conference on Future BioMedical…
2009
Corpus ID: 17000381
With the development of network, the issues of network security are rapidly becoming a serious problem, and the Denial of Service…
Expand
2009
2009
A More Accurate Scheme to Detect SYN Flood Attacks
Changhua Sun
,
Chengchen Hu
,
Yachao Zhou
,
Xin Xiao
,
B. Liu
IEEE INFOCOM Workshops
2009
Corpus ID: 16930263
We propose to use the SYN/ACK-CliACK pair's behavior to detect the various SYN flood attacks more accurately. The SYN/ACK packets…
Expand
2009
2009
Preventing SYN flood DoS attacks (Abstract) An improvement to SYN cookies
Sahand KhakAbi
IEEE International Conference on Intelligence and…
2009
Corpus ID: 16600070
In 2006, 100,000 servers were broken down just within 10 minutes [1]. Those were the victims of some Denial-of-Service attacks…
Expand
2008
2008
Comparison of operating system implementations of SYN flood defenses (Cookies)
C. Smith
,
A. Matrawy
Biennial Symposium on Communications
2008
Corpus ID: 32363132
In this paper, we report on our comparison of the operating system implementation of the most common defense against SYN flood…
Expand
2008
2008
Securing stateful grid servers through virtual server rotation
Matthew Smith
,
C. Schridde
,
Bernd Freisleben
IEEE International Symposium on High-Performance…
2008
Corpus ID: 2698087
The Grid computing paradigm is aimed at providing seamless access to different kinds of resources, such as compute clusters, data…
Expand
2008
2008
Network and Internet Vulnerabilities Computer Security Lecture 10
David Aspinall
2008
Corpus ID: 61254628
É General pattern in serious Internet incidents: 1. Someone finds an exploit (usually via software bug) 2. Exploit is seen in the…
Expand
2007
2007
Performance Evaluation for Linux under SYN Flooding Attacks
S. Oshima
,
T. Nakashima
International Conference on Innovative Computing…
2007
Corpus ID: 6818999
The SYN flooding attack is a DoS(denial of service) method affecting hosts to retain the half-open state and causing to exhaust…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE