Academic literature on the topic 'SYN flooding'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SYN flooding.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SYN flooding"

1

Bang, Gihyun, Deokjai Choi, and Sangwon Bang. "A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments." Journal of Korea Multimedia Society 18, no. 1 (January 30, 2015): 35–41. http://dx.doi.org/10.9717/kmms.2015.18.1.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.

Full text
Abstract:
A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

M., Jamaluddin, Touqir Anwar M., K. Saira, and M. Y. Wani. "DDoS SYN Flooding; Mitigation and Prevention." International Journal of Scientific and Engineering Research 5, no. 12 (December 24, 2014): 484–90. http://dx.doi.org/10.14299/ijser.2014.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Junaid, Muhammad, Fahad Ali Khan, Ali Imran Jehangiri, Yousaf Saeed, Mehmood Ahmed, Luqman Shah, and Muhammad Naeem. "An Indigenous Solution for SYN Flooding." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 22, 2021): 2998–3022. http://dx.doi.org/10.47059/revistageintec.v11i4.2334.

Full text
Abstract:
SYN flooding is one of the most challenging problems that many networks applications face, particularly those that are security-related. Disrupting a server's daily function and assigning it to other tasks leaves it a constantly busy server that processes little usable data. In this research, a comprehensive INDIGSOL approach is demonstrated that not only detects SYN flooding but also prevents the attacker(s) from making such attempts in the future. The designed approach has four modules such as node registration and validation, packet capturing, dynamic check system, and hook activation. The approach is further checked and compared with some state-of-the-art baselines on various parameters like detection time, response/processing time, and number of malicious packets detection. It is observed that INDIGSOL performed better than other baselines with an average accuracy of 99% malicious packet detection in six scenarios along with 13.4% faster detection time and 11.2% faster response/processing time. Overall, the provided solution is scalable, robust, and highly accurate that prevents SYN flooding in a timely manner.
APA, Harvard, Vancouver, ISO, and other styles
5

Manna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammadi, Reza, Reza Javidan, and Mauro Conti. "SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks." IEEE Transactions on Network and Service Management 14, no. 2 (June 2017): 487–97. http://dx.doi.org/10.1109/tnsm.2017.2701549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.

Full text
Abstract:
This paper explores a novel danger theory based model to aware the situation for TCP SYN flooding attacks. Within in the presented model, the TCP SYN flooding attacks are looked as dangerous exogenous patterns, and induce danger signals to aware the situation of host computers, which is realized by hosted-based artificial immune detectors. After summarizing the danger theory, the model framework, correlative concepts, TCP SYN flooding attack detection, danger signal computation and attack situation awareness methods are described. Following that, the interrelated techniques are compared. Theoretical analysis results show that the proposed model is valid. Thus, it provides a good solution to computer network security.
APA, Harvard, Vancouver, ISO, and other styles
8

Baik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (March 31, 2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Wei, and Dit-Yan Yeung. "Throttling spoofed SYN flooding traffic at the source." Telecommunication Systems 33, no. 1-3 (November 2, 2006): 47–65. http://dx.doi.org/10.1007/s11235-006-9006-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (August 16, 2011): 709–24. http://dx.doi.org/10.1002/sec.365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SYN flooding"

1

Thorstensson, Jonatan. "Genomgång av skyddsmetoder för TCP SYN flooding." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4103.

Full text
Abstract:

Följande arbete behandlar möjliga lösningar för hantering av SYN flooding, en Denial-of-Service-attack mot tjänster som använder TCP för kommunikation över datanätverk. Ett flertal olika skyddsmetoder, med varierande ansatser, identifieras, beskrivs och undersöks. Även möjligheter att kombinera dessa analyseras. Det visas att genom att implementera existerande skydd, samt kombinera flera av dessa begränsas hotet från SYN flooding avsevärt. Rekommendationer presenteras dessutom för hur organisationer bör gå tillväga för att säkra tjänster som riskerar att utsättas för SYN flooding-attacker genom att implementera skydd nära tjänsten först  samt  därefter ytterligare lager allt längre ut i nätverket.

APA, Harvard, Vancouver, ISO, and other styles
2

Marsik, Matthew P. "Simulation of flooding responses to land cover change in the Quebrada Estero watershed in San Ram'on, alajuela, Costa Rica." [Gainesville, Fla.]: University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.

Full text
Abstract:
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Gimelli, Gabriele. "Studio e valutazione sperimentale di tecniche di sincronizzazione per reti di sensori 6LoWPAN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15434/.

Full text
Abstract:
I recenti progressi nella tecnologia applicata alla produzione dei system-on-a-chip hanno permesso lo sviluppo di piccoli dispositivi per il rilevamento a basso costo, a bassa potenza e multifunzione, che sono in grado di svolgere attività quali il rilevamento, l'elaborazione dati e la comunicazione. Una rete di sensori wireless (WSN) è una rete distribuita che consiste, in generale, di un gran numero di nodi di sensori, densamente distribuiti su un'ampia area geografica per tracciare un determinato fenomeno fisico. Le reti di sensori wireless sono oggigiorno utilizzate in un'ampia gamma di applicazioni come quelle mediche, industriali, militari, ambientali, scientifiche e in reti domestiche. In tutte queste applicazioni, la sincronizzazione temporale è un componente molto importante di una rete di sensori wireless, come del resto in ogni sistema distribuito. Questa tesi ha come scopo principale lo studio dei protocolli esistenti che consentono di risolvere il problema della sincronizzazione tra i nodi di una rete wireless, analizzando in particolare le tecniche TPSN e FTSP. Queste tecniche sono poi state implementate all'interno di una rete wireless di sensori 6LoWPAN già esistente, osservandone poi le performance tramite una serie di test effettuati tramite l'utilizzo della rete all'interno di un ambiente reale.
APA, Harvard, Vancouver, ISO, and other styles
5

黃韜維. "A Study on SYN Flooding." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/71015049361761487588.

Full text
Abstract:
碩士
國立交通大學
資訊工程系
89
Under the SYN Flooding attack, the attacker sends a large volume of SYN packets to a victim. However, the source IP addresses in the packets are spoofed addresses. Therefore, the victim's backlog queue is full of SYN+ACK packets because it never receives ACK packet from the spoofed address. The victim then cannot provide service because its backlog queue fills up and cannot receive incoming legitimate SYN requests. This thesis summarizes the existing approaches for preventing SYN Flooding and compares their pros and cons. We refine the SYN Cookie mechanism by modifying the SYN Cache approach. Furthermore, we propose a new solution and implement a prototype system on FreeBSD platform. The experimental results show that the proposed approach can effectively prevent the victim from SYN Flooding attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Wei-Yuah, and 李維岳. "Counteract TCP SYN Flooding Using Second Chance Packet Filtering." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/97528950719901353473.

Full text
Abstract:
碩士
東海大學
資訊工程與科學系碩士在職專班
97
Distributed Denial of Service (DDoS) attacks have been one of the most serious problems on the Internet and the TCP layer usually suffers from such attacks. In addition, TCP based DDoS attacks usually lead a huge damage. In this article, we describe the evolution of DDoS, and then we summarize TCP connection which is a three-way handshake process. Besides, we explain the formation of half open connections, which is the key point of being collapsed by the distribute denial of service attacks. Moreover, we propose the Second Chance Packet Filtering (SCPF) to counteract TCP SYN Flooding, and pass the legitimate TCP traffic during the TCP SYN Flooding based DDoS attack. Although the proposed method cannot solve the TCP SYN problem completely, it still provides good services to the legitimate user.
APA, Harvard, Vancouver, ISO, and other styles
7

Zeng, Yu-Guo, and 曾昱國. "The Study of SYN Flooding Defense-Based on Traffic Control." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/d394u4.

Full text
Abstract:
碩士
中央警察大學
資訊管理研究所
87
With the growing Intemet community, issues of network security have also been turned to be a serious matter. Many researchers are trying to resolve these new crime patterns and security threats. But it's difficult to resolve those problems, because there are so many different crime or attacking methods. In this thesis, we focus on the topic of TCP-based SYN flooding attack, which is a kind of Denial of Service (DoS) attack. The purpose of this study is to provide an alternative way for the prevention of SYN flooding attack. In our study, the Asynchronous Transfer Mode(ATM)traffic control concept is applied for the prevention of DoS attack. We hope that the proposed scheme could protect the backlog from suffering the increasing faked SYN packets. The research process can be divided into two dimensions. Firstly, we establish a SYN flooding attack environment. The purpose of this stage is to discover the phenomenon of the real environment through the experiment at this environment. From our experiment, we find out the controllable target of SYN flooding attack for our different defense mechanisms, which will be considered in the second stage. Secondly, the ATM Usage Parameter Control(UPC)mechanism is utilized as the defense scheme to relax the large number of SYN packets. The advantages of this concept is that the regular users can still have the chances to pass through the controller under SYN flooding attack and to establish the TCP connection, opposite to the no controlling situation and those current defense methods. The experimental results show that the proposed method demonstrates a quite good defense performance when comparing to which without control.
APA, Harvard, Vancouver, ISO, and other styles
8

Tseng, Yu-Kuo, and 曾昱國. "The Study of SYN Flooding Defense -- Based on Traffic Control." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/85862272376488354198.

Full text
Abstract:
碩士
中央警察大學
資訊管理研究所
87
With the growing Internet community, issues of network security have also been turned to be a serious matter. Many researchers are trying to resolve these new crime patterns and security threats. But it''s difficult to resolve those problems, because there are so many different crime or attacking methods. In this thesis, we focus on the topic of TCP-based SYN flooding attack, which is a kind of Denial of Service (DoS) attack. The purpose of this study is to provide an alternative way for the prevention of SYN flooding attack. In our study, the Asynchronous Transfer Mode (ATM) traffic control concept is applied for the prevention of DoS attack. We hope that the proposed scheme could protect the backlog from suffering the increasing faked SYN packets.The research process can be divided into two dimensions. Firstly, we establish a SYN flooding attack environment. The purpose of this stage is to discover the phenomenon of the real environment through the experiment at this environment. From our experiment, we find out the controllable target of SYN flooding attack for our different defense mechanisms, which will be considered in the second stage. Secondly, the ATM Usage Parameter Control (UPC) mechanism is utilized as the defense scheme to relax the large number of SYN packets. The advantages of this concept is that the regular users can still have the chances to pass through the controller under SYN flooding attack and to establish the TCP connection, opposite to the no controlling situation and those current defense methods. The experimental results show that the proposed method demonstrates a quite good defense performance when comparing to which without control.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Fu-ping, and 陳復平. "A Novel TCP Implementation for Defending Against TCP SYN Flooding Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45765546490259627806.

Full text
Abstract:
碩士
義守大學
資訊工程學系碩士班
93
With the rapid growth and increasing popularity of the Internet and E-Commerce, Denial of Service (DoS) attacks have become one of new criminal actions. More are TCP SYN Flood attacks, since the attackers can easily take advantage of the TCP specification to generate traffic making the services of public servers unavailable. Each time a client attempts to create a connection with a server, some connection state information is stored on the server. Since the connection state information stored requires memory and operating system resources, only a limited number of in progress connections are allowed. The TCP SYN attack sends a constant stream of TCP connection requests to overwhelm the server, forcing the server to allocate resources for each new connection until all resources are exhausted. As a result, the server is unable to respond to legitimate connections. Therefore, the thesis proposes a stateless connection mechanism to defend the TCP SYN Flooding attacks. Instead of storing state information in server’s memory, the new mechanism stores the state information in the sequence number of a SYN/ACK packet. The mechanism determines the accuracy of an ACK packet by checking the received sequence number in the ACK packet. The thesis presents three sequence number generating methods, from the simplest one to a more complicated means, for enhancing the security of a server. For demonstrating the correctness of the proposed mechanism, furthermore, the thesis implements it by modifying the kernel program of FreeBSD. Experimental results show that our proposed mechanism can defend servers from SYN Flooding attacks, improve the security of a server, and provide normal services to legitimate users.
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Jia-Rong, and 孫加榮. "The Study on Investigation Procedure of Cybercrime for SYN Flooding Attack." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/58659357419922884220.

Full text
Abstract:
博士
亞洲大學
資訊工程學系
103
The cybercrime with the development of networks, it has many crime types, include network attack, mail fraud, intimidation, copyright infringement, and so on. For network attack, many approaches have been proposed to detect and defense. However, after confirm the network attack or others crime exist, it still needs to execute the investigation procedure by the investigators, collect the evidences related to the crime, find the perpetrators, and prosecute them. This study aims to propose a new cybercrime investigation approach, which is used to find the criminal (attacker) and direct digital evidences after the Distributed Denial of Service (DDoS) attack happened. We improve the conventional investigation procedure, and collect the digital evidences and compare repeatedly, finding the high possible suspects. After this, we collect the digital evidences and others crime information from victims and ISP, and use to prove the suspects ever commit the crime fact. At the same time, we will prove the probative force of the collected digital evidences, which will be same with the evidences from search and seize. Therefore, by using our investigation procedure, we wish it will help the investigators to find the suspects and strong evidences without search and seize, saving the judicial resources. Furthermore, we collect the court judgments of cybercrime in recent years, and describe the recent status of cybercrime and cybercrime judgments. And then, we will propose the detection approaches for detect SYN flooding attack. In the detection approaches, they include two detection approaches, MISO (Multi-input Single-output) policy and MIMO (Multi-input Multi-output) policy. These two detection approach improve the problems of detection approach based on Entropy, and make them can be used to the wider connection environment. In the future, the types, methods, and targets of cybercrime will be changed continues, every types of computer, network equipment, and smart phone will be the target of attack. It focuses on how the current cybercrime investigation methods combined with digital evidence collection. And even set up a defense method in the investigation process, to achieve an effective network for crime prevention, detection and investigation purposes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SYN flooding"

1

Hjalmarson, H. W. Flood of October 1983 and history of flooding along the San Francisco River, Clifton, Arizona. Tucson, Ariz: Dept. of the Interior, U.S. Geological Survey, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Transportation Safety Board. Evaluation of pipeline failures during flooding and of spill response actions, San Jacinto River near Houston, Texas, October 1994. Washington, DC: National Transportation Safety Board, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. National Transportation Safety Board. Evaluation of pipeline failures during flooding and of spill response actions, San Jacinto River near Houston, Texas, October 1994. Washington, DC: National Transportation Safety Board, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SYN flooding"

1

Nalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies, 895–905. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology, 385–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

He, Yanxiang, Wei Chen, and Bin Xiao. "Detecting SYN Flooding Attacks Near Innocent Side." In Lecture Notes in Computer Science, 443–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599463_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shakhov, Vladimir V., and Hyunseung Choo. "On Modeling Counteraction against TCP SYN Flooding." In Lecture Notes in Computer Science, 574–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89524-4_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications, 29–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sakthivel, E., R. Anitha, S. Arunachalam, and M. Hindumathy. "Detracting TCP-Syn Flooding Attacks in Software Defined Networking Environment." In Emerging Trends in Computing and Expert Technology, 888–98. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32150-5_89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mushi, Joseph C., Mussa Kissaka, and Kosmas Kapis. "ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity." In Lecture Notes in Computer Science, 454–61. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92058-0_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alipour, H., M. Kashefi Kia, and M. Esmaeili. "Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic." In Communications in Computer and Information Science, 125–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mkuzangwe, Nenekazi Nokuthala Penelope, and Fulufhelo Vincent Nelwamondo. "A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack." In Intelligent Information and Database Systems, 14–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54430-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security, 57–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SYN flooding"

1

"SYN Flooding Attack Detection and Mitigation in SDN." In 2019 the 9th International Workshop on Computer Science and Engineering. WCSE, 2019. http://dx.doi.org/10.18178/wcse.2019.03.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arshadi, Laleh, and Amir Hossein Jahangir. "Entropy based SYN flooding detection." In 2011 IEEE 36th Conference on Local Computer Networks (LCN 2011). IEEE, 2011. http://dx.doi.org/10.1109/lcn.2011.6115171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, DongHyuk, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, and Minho Park. "An Effective Defense Against SYN Flooding Attack in SDN." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Tae-Hyung, Young-Sik Choi, Jong Kim, and Sung Je Hong. "Annulling SYN Flooding Attacks with Whitelist." In 2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oo, Nan Haymarn, and Aung Htein Maw. "Effective Detection and Mitigation of SYN Flooding Attack in SDN." In 2019 19th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 2019. http://dx.doi.org/10.1109/iscit.2019.8905209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tuncer, Taner, and Yetkin Tatar. "Detection SYN Flooding Attacks Using Fuzzy Logic." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Geetha, K., and N. Sreenath. "SYN flooding attack — Identification and analysis." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pi-E Liu and Zhong-Hua Sheng. "Defending against tcp syn flooding with a new kind of syn-agent." In 2008 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2008. http://dx.doi.org/10.1109/icmlc.2008.4620589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Ting-Yu, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, and Meng-Hsun Tsai. "Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane." In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2020. http://dx.doi.org/10.23919/apnoms50412.2020.9236951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oshima, Shunsuke, and Takuo Nakashima. "Performance Evaluation for Linux under SYN Flooding Attacks." In Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icicic.2007.449.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SYN flooding"

1

Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ayala, David, Ashley Graves, Colton Lauer, Henrik Strand, Chad Taylor, Kyle Weldon, and Ryan Wood. Flooding Events Post Hurricane Harvey: Potential Liability for Dam and Reservoir Operators and Recommendations Moving Forward. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, September 2018. http://dx.doi.org/10.37419/eenrs.floodingpostharvey.

Full text
Abstract:
When Hurricane Harvey hit the Texas coast as a category 4 hurricane on August 25, 2017, it resulted in $125 billion in damage, rivaling only Hurricane Katrina in the amount of damage caused. It also resulted in the deaths of 88 people and destroyed or damaged 135,000 homes. Much of that devastation was the result of flooding. The storm dumped over 27 trillion gallons of rain over Texas in a matter of days. Some parts of Houston received over 50 inches of rainfall. The potential liability that dam and reservoir operators may face for decisions they make during storm and flooding events has now become a major concern for Texas citizens and its elected officials. Law suits have now been instituted against the federal government for its operation of two flood control reservoirs, as well as against the San Jacinto River Authority for its operation of a water supply reservoir. Moreover, the issues and concerns have been placed on the agenda of a number of committees preparing for the 2019 Texas legislative session. This report reviews current dam and reservoir operations in Texas and examines the potential liability that such operators may face for actions and decisions taken in response to storm and flooding events. In Section III, the report reviews dam gate operations and differentiates between water supply reservoirs and flood control reservoirs. It also considers pre-release options and explains why such actions are disfavored and not recommended. In Section IV, the report evaluates liabilities and defenses applicable to dam and reservoir operators. It explains how governmental immunity can limit the exposure of state and federally-run facilities to claims seeking monetary damages. It also discusses how such entities could be subject to claims of inverse condemnation, which generally are not subject to governmental immunity, under Texas law as well as under the Fifth Amendment to the U.S. Constitution. In addition, the Section discusses negligence and nuisance claims and concludes that plaintiffs asserting either or both of these claims will have difficulty presenting successful arguments for flooding-related damage and harm against operators who act reasonably in the face of storm-related precipitation. Finally, Section V offers recommendations that dam and reservoir operators might pursue in order to engage and educate the public and thereby reduce the potential for disputes and litigation. Specifically, the report highlights the need for expanded community outreach efforts to engage with municipalities, private land owners, and the business community in flood-prone neighborhoods both below and above a dam. It also recommends implementation of proactive flood notification procedures as a way of reaching and alerting as many people as possible of potential and imminent flooding events. Finally, the report proposes implementation of a dispute prevention and minimization mechanism and offers recommendations for the design and execution of such a program.
APA, Harvard, Vancouver, ISO, and other styles
3

Flood of October 1983 and history of flooding along the San Francisco River, Clifton, Arizona. US Geological Survey, 1990. http://dx.doi.org/10.3133/wri854225b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography