SYN flood

Known as: Synflood, SYN flooding, Syn-flood 
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Due to advances in Internet Technology applications, the clients at remote places require constant services from a server… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2009
2009
SYN flood attacks still dominate Distributed Denial of Service attacks. It is a great challenge to accurately detect the SYN… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2009
2009
Distributed Denial-of-Service (DDoS) attack remains a serious problem on the Internet, as it takes advantage of the lack of… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any… (More)
Is this relevant?
2007
2007
The problem of detecting distributed denial of service (DDoS) attacks, and particularly SYN flood attacks, has received much… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
DoS (Denial of Service) attacks are easily performed by utilizing the weakness of the network protocol. If should be notable that… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2005
2005
Stateful Inspection has become a classical technology for network firewall. Existing session table architectures of Stateful… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Machinesthat provide TCP servicesareoften susceptible to varioustypesof Denial of Serviceattacksfrom external hostson the network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents a simple and robust mechanism called SYN-dog to sniff SYN flooding sources. We install SYN-dog as a softwar e… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?