Academic literature on the topic 'SYN flooding'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SYN flooding.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SYN flooding"
Bang, Gihyun, Deokjai Choi, and Sangwon Bang. "A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments." Journal of Korea Multimedia Society 18, no. 1 (January 30, 2015): 35–41. http://dx.doi.org/10.9717/kmms.2015.18.1.035.
Full textRamanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textM., Jamaluddin, Touqir Anwar M., K. Saira, and M. Y. Wani. "DDoS SYN Flooding; Mitigation and Prevention." International Journal of Scientific and Engineering Research 5, no. 12 (December 24, 2014): 484–90. http://dx.doi.org/10.14299/ijser.2014.12.001.
Full textJunaid, Muhammad, Fahad Ali Khan, Ali Imran Jehangiri, Yousaf Saeed, Mehmood Ahmed, Luqman Shah, and Muhammad Naeem. "An Indigenous Solution for SYN Flooding." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 22, 2021): 2998–3022. http://dx.doi.org/10.47059/revistageintec.v11i4.2334.
Full textManna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.
Full textMohammadi, Reza, Reza Javidan, and Mauro Conti. "SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks." IEEE Transactions on Network and Service Management 14, no. 2 (June 2017): 487–97. http://dx.doi.org/10.1109/tnsm.2017.2701549.
Full textSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Full textBaik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (March 31, 2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.
Full textChen, Wei, and Dit-Yan Yeung. "Throttling spoofed SYN flooding traffic at the source." Telecommunication Systems 33, no. 1-3 (November 2, 2006): 47–65. http://dx.doi.org/10.1007/s11235-006-9006-0.
Full textBellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (August 16, 2011): 709–24. http://dx.doi.org/10.1002/sec.365.
Full textDissertations / Theses on the topic "SYN flooding"
Thorstensson, Jonatan. "Genomgång av skyddsmetoder för TCP SYN flooding." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4103.
Full textFöljande arbete behandlar möjliga lösningar för hantering av SYN flooding, en Denial-of-Service-attack mot tjänster som använder TCP för kommunikation över datanätverk. Ett flertal olika skyddsmetoder, med varierande ansatser, identifieras, beskrivs och undersöks. Även möjligheter att kombinera dessa analyseras. Det visas att genom att implementera existerande skydd, samt kombinera flera av dessa begränsas hotet från SYN flooding avsevärt. Rekommendationer presenteras dessutom för hur organisationer bör gå tillväga för att säkra tjänster som riskerar att utsättas för SYN flooding-attacker genom att implementera skydd nära tjänsten först samt därefter ytterligare lager allt längre ut i nätverket.
Marsik, Matthew P. "Simulation of flooding responses to land cover change in the Quebrada Estero watershed in San Ram'on, alajuela, Costa Rica." [Gainesville, Fla.]: University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000743.
Full textDudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.
Full textGimelli, Gabriele. "Studio e valutazione sperimentale di tecniche di sincronizzazione per reti di sensori 6LoWPAN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15434/.
Full text黃韜維. "A Study on SYN Flooding." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/71015049361761487588.
Full text國立交通大學
資訊工程系
89
Under the SYN Flooding attack, the attacker sends a large volume of SYN packets to a victim. However, the source IP addresses in the packets are spoofed addresses. Therefore, the victim's backlog queue is full of SYN+ACK packets because it never receives ACK packet from the spoofed address. The victim then cannot provide service because its backlog queue fills up and cannot receive incoming legitimate SYN requests. This thesis summarizes the existing approaches for preventing SYN Flooding and compares their pros and cons. We refine the SYN Cookie mechanism by modifying the SYN Cache approach. Furthermore, we propose a new solution and implement a prototype system on FreeBSD platform. The experimental results show that the proposed approach can effectively prevent the victim from SYN Flooding attack.
Lee, Wei-Yuah, and 李維岳. "Counteract TCP SYN Flooding Using Second Chance Packet Filtering." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/97528950719901353473.
Full text東海大學
資訊工程與科學系碩士在職專班
97
Distributed Denial of Service (DDoS) attacks have been one of the most serious problems on the Internet and the TCP layer usually suffers from such attacks. In addition, TCP based DDoS attacks usually lead a huge damage. In this article, we describe the evolution of DDoS, and then we summarize TCP connection which is a three-way handshake process. Besides, we explain the formation of half open connections, which is the key point of being collapsed by the distribute denial of service attacks. Moreover, we propose the Second Chance Packet Filtering (SCPF) to counteract TCP SYN Flooding, and pass the legitimate TCP traffic during the TCP SYN Flooding based DDoS attack. Although the proposed method cannot solve the TCP SYN problem completely, it still provides good services to the legitimate user.
Zeng, Yu-Guo, and 曾昱國. "The Study of SYN Flooding Defense-Based on Traffic Control." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/d394u4.
Full text中央警察大學
資訊管理研究所
87
With the growing Intemet community, issues of network security have also been turned to be a serious matter. Many researchers are trying to resolve these new crime patterns and security threats. But it's difficult to resolve those problems, because there are so many different crime or attacking methods. In this thesis, we focus on the topic of TCP-based SYN flooding attack, which is a kind of Denial of Service (DoS) attack. The purpose of this study is to provide an alternative way for the prevention of SYN flooding attack. In our study, the Asynchronous Transfer Mode(ATM)traffic control concept is applied for the prevention of DoS attack. We hope that the proposed scheme could protect the backlog from suffering the increasing faked SYN packets. The research process can be divided into two dimensions. Firstly, we establish a SYN flooding attack environment. The purpose of this stage is to discover the phenomenon of the real environment through the experiment at this environment. From our experiment, we find out the controllable target of SYN flooding attack for our different defense mechanisms, which will be considered in the second stage. Secondly, the ATM Usage Parameter Control(UPC)mechanism is utilized as the defense scheme to relax the large number of SYN packets. The advantages of this concept is that the regular users can still have the chances to pass through the controller under SYN flooding attack and to establish the TCP connection, opposite to the no controlling situation and those current defense methods. The experimental results show that the proposed method demonstrates a quite good defense performance when comparing to which without control.
Tseng, Yu-Kuo, and 曾昱國. "The Study of SYN Flooding Defense -- Based on Traffic Control." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/85862272376488354198.
Full text中央警察大學
資訊管理研究所
87
With the growing Internet community, issues of network security have also been turned to be a serious matter. Many researchers are trying to resolve these new crime patterns and security threats. But it''s difficult to resolve those problems, because there are so many different crime or attacking methods. In this thesis, we focus on the topic of TCP-based SYN flooding attack, which is a kind of Denial of Service (DoS) attack. The purpose of this study is to provide an alternative way for the prevention of SYN flooding attack. In our study, the Asynchronous Transfer Mode (ATM) traffic control concept is applied for the prevention of DoS attack. We hope that the proposed scheme could protect the backlog from suffering the increasing faked SYN packets.The research process can be divided into two dimensions. Firstly, we establish a SYN flooding attack environment. The purpose of this stage is to discover the phenomenon of the real environment through the experiment at this environment. From our experiment, we find out the controllable target of SYN flooding attack for our different defense mechanisms, which will be considered in the second stage. Secondly, the ATM Usage Parameter Control (UPC) mechanism is utilized as the defense scheme to relax the large number of SYN packets. The advantages of this concept is that the regular users can still have the chances to pass through the controller under SYN flooding attack and to establish the TCP connection, opposite to the no controlling situation and those current defense methods. The experimental results show that the proposed method demonstrates a quite good defense performance when comparing to which without control.
Chen, Fu-ping, and 陳復平. "A Novel TCP Implementation for Defending Against TCP SYN Flooding Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45765546490259627806.
Full text義守大學
資訊工程學系碩士班
93
With the rapid growth and increasing popularity of the Internet and E-Commerce, Denial of Service (DoS) attacks have become one of new criminal actions. More are TCP SYN Flood attacks, since the attackers can easily take advantage of the TCP specification to generate traffic making the services of public servers unavailable. Each time a client attempts to create a connection with a server, some connection state information is stored on the server. Since the connection state information stored requires memory and operating system resources, only a limited number of in progress connections are allowed. The TCP SYN attack sends a constant stream of TCP connection requests to overwhelm the server, forcing the server to allocate resources for each new connection until all resources are exhausted. As a result, the server is unable to respond to legitimate connections. Therefore, the thesis proposes a stateless connection mechanism to defend the TCP SYN Flooding attacks. Instead of storing state information in server’s memory, the new mechanism stores the state information in the sequence number of a SYN/ACK packet. The mechanism determines the accuracy of an ACK packet by checking the received sequence number in the ACK packet. The thesis presents three sequence number generating methods, from the simplest one to a more complicated means, for enhancing the security of a server. For demonstrating the correctness of the proposed mechanism, furthermore, the thesis implements it by modifying the kernel program of FreeBSD. Experimental results show that our proposed mechanism can defend servers from SYN Flooding attacks, improve the security of a server, and provide normal services to legitimate users.
Sun, Jia-Rong, and 孫加榮. "The Study on Investigation Procedure of Cybercrime for SYN Flooding Attack." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/58659357419922884220.
Full text亞洲大學
資訊工程學系
103
The cybercrime with the development of networks, it has many crime types, include network attack, mail fraud, intimidation, copyright infringement, and so on. For network attack, many approaches have been proposed to detect and defense. However, after confirm the network attack or others crime exist, it still needs to execute the investigation procedure by the investigators, collect the evidences related to the crime, find the perpetrators, and prosecute them. This study aims to propose a new cybercrime investigation approach, which is used to find the criminal (attacker) and direct digital evidences after the Distributed Denial of Service (DDoS) attack happened. We improve the conventional investigation procedure, and collect the digital evidences and compare repeatedly, finding the high possible suspects. After this, we collect the digital evidences and others crime information from victims and ISP, and use to prove the suspects ever commit the crime fact. At the same time, we will prove the probative force of the collected digital evidences, which will be same with the evidences from search and seize. Therefore, by using our investigation procedure, we wish it will help the investigators to find the suspects and strong evidences without search and seize, saving the judicial resources. Furthermore, we collect the court judgments of cybercrime in recent years, and describe the recent status of cybercrime and cybercrime judgments. And then, we will propose the detection approaches for detect SYN flooding attack. In the detection approaches, they include two detection approaches, MISO (Multi-input Single-output) policy and MIMO (Multi-input Multi-output) policy. These two detection approach improve the problems of detection approach based on Entropy, and make them can be used to the wider connection environment. In the future, the types, methods, and targets of cybercrime will be changed continues, every types of computer, network equipment, and smart phone will be the target of attack. It focuses on how the current cybercrime investigation methods combined with digital evidence collection. And even set up a defense method in the investigation process, to achieve an effective network for crime prevention, detection and investigation purposes.
Books on the topic "SYN flooding"
Hjalmarson, H. W. Flood of October 1983 and history of flooding along the San Francisco River, Clifton, Arizona. Tucson, Ariz: Dept. of the Interior, U.S. Geological Survey, 1990.
Find full textUnited States. National Transportation Safety Board. Evaluation of pipeline failures during flooding and of spill response actions, San Jacinto River near Houston, Texas, October 1994. Washington, DC: National Transportation Safety Board, 1996.
Find full textUnited States. National Transportation Safety Board. Evaluation of pipeline failures during flooding and of spill response actions, San Jacinto River near Houston, Texas, October 1994. Washington, DC: National Transportation Safety Board, 1996.
Find full textBook chapters on the topic "SYN flooding"
Nalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies, 895–905. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.
Full textShin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology, 385–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.
Full textHe, Yanxiang, Wei Chen, and Bin Xiao. "Detecting SYN Flooding Attacks Near Innocent Side." In Lecture Notes in Computer Science, 443–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599463_44.
Full textShakhov, Vladimir V., and Hyunseung Choo. "On Modeling Counteraction against TCP SYN Flooding." In Lecture Notes in Computer Science, 574–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89524-4_57.
Full textLiu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications, 29–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.
Full textSakthivel, E., R. Anitha, S. Arunachalam, and M. Hindumathy. "Detracting TCP-Syn Flooding Attacks in Software Defined Networking Environment." In Emerging Trends in Computing and Expert Technology, 888–98. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32150-5_89.
Full textMushi, Joseph C., Mussa Kissaka, and Kosmas Kapis. "ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity." In Lecture Notes in Computer Science, 454–61. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92058-0_44.
Full textAlipour, H., M. Kashefi Kia, and M. Esmaeili. "Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic." In Communications in Computer and Information Science, 125–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_16.
Full textMkuzangwe, Nenekazi Nokuthala Penelope, and Fulufhelo Vincent Nelwamondo. "A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack." In Intelligent Information and Database Systems, 14–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54430-4_2.
Full textXie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security, 57–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.
Full textConference papers on the topic "SYN flooding"
"SYN Flooding Attack Detection and Mitigation in SDN." In 2019 the 9th International Workshop on Computer Science and Engineering. WCSE, 2019. http://dx.doi.org/10.18178/wcse.2019.03.022.
Full textArshadi, Laleh, and Amir Hossein Jahangir. "Entropy based SYN flooding detection." In 2011 IEEE 36th Conference on Local Computer Networks (LCN 2011). IEEE, 2011. http://dx.doi.org/10.1109/lcn.2011.6115171.
Full textKim, DongHyuk, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, and Minho Park. "An Effective Defense Against SYN Flooding Attack in SDN." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939937.
Full textKim, Tae-Hyung, Young-Sik Choi, Jong Kim, and Sung Je Hong. "Annulling SYN Flooding Attacks with Whitelist." In 2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.218.
Full textOo, Nan Haymarn, and Aung Htein Maw. "Effective Detection and Mitigation of SYN Flooding Attack in SDN." In 2019 19th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 2019. http://dx.doi.org/10.1109/iscit.2019.8905209.
Full textTuncer, Taner, and Yetkin Tatar. "Detection SYN Flooding Attacks Using Fuzzy Logic." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.50.
Full textGeetha, K., and N. Sreenath. "SYN flooding attack — Identification and analysis." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033828.
Full textPi-E Liu and Zhong-Hua Sheng. "Defending against tcp syn flooding with a new kind of syn-agent." In 2008 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2008. http://dx.doi.org/10.1109/icmlc.2008.4620589.
Full textLin, Ting-Yu, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, and Meng-Hsun Tsai. "Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane." In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2020. http://dx.doi.org/10.23919/apnoms50412.2020.9236951.
Full textOshima, Shunsuke, and Takuo Nakashima. "Performance Evaluation for Linux under SYN Flooding Attacks." In Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icicic.2007.449.
Full textReports on the topic "SYN flooding"
Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, August 2007. http://dx.doi.org/10.17487/rfc4987.
Full textAyala, David, Ashley Graves, Colton Lauer, Henrik Strand, Chad Taylor, Kyle Weldon, and Ryan Wood. Flooding Events Post Hurricane Harvey: Potential Liability for Dam and Reservoir Operators and Recommendations Moving Forward. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, September 2018. http://dx.doi.org/10.37419/eenrs.floodingpostharvey.
Full textFlood of October 1983 and history of flooding along the San Francisco River, Clifton, Arizona. US Geological Survey, 1990. http://dx.doi.org/10.3133/wri854225b.
Full text