Academic literature on the topic 'Syn flooding attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Syn flooding attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Syn flooding attack"
Ramanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textAli, Hamid M., Ibraheem K. Ibraheem, and Sarah W. A. Ahmad. "Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack." Journal of Engineering 19, no. 6 (2023): 786–94. http://dx.doi.org/10.31026/j.eng.2013.06.10.
Full textSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Full textMohd Fuzi, Mohd Faris, Nur Fatin Mohammad Ashraf, and Muhammad Nabil Fikri Jamaluddin. "Integrated Network Monitoring using Zabbix with Push Notification via Telegram." Journal of Computing Research and Innovation 7, no. 1 (2022): 147–55. http://dx.doi.org/10.24191/jcrinn.v7i1.282.
Full textYang, Chun-Hao, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, and Meng-Hsun Tsai. "Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists." Sensors 23, no. 8 (2023): 3817. http://dx.doi.org/10.3390/s23083817.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textManna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textAzis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.
Full textBellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (2011): 709–24. http://dx.doi.org/10.1002/sec.365.
Full textDissertations / Theses on the topic "Syn flooding attack"
Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.
Full textSun, Jia-Rong, and 孫加榮. "The Study on Investigation Procedure of Cybercrime for SYN Flooding Attack." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/58659357419922884220.
Full textWei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.
Full textChen, Fu-ping, and 陳復平. "A Novel TCP Implementation for Defending Against TCP SYN Flooding Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45765546490259627806.
Full textTzeng-Yu, Chen. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709313176.
Full textChen, Tzeng-Yu, and 陳宗右. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/36453050738828817765.
Full textRasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.
Full textBook chapters on the topic "Syn flooding attack"
Shin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.
Full textNalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.
Full textLiu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.
Full textAlipour, H., M. Kashefi Kia, and M. Esmaeili. "Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_16.
Full textMkuzangwe, Nenekazi Nokuthala Penelope, and Fulufhelo Vincent Nelwamondo. "A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack." In Intelligent Information and Database Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54430-4_2.
Full textHe, Yanxiang, Wei Chen, and Bin Xiao. "Detecting SYN Flooding Attacks Near Innocent Side." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599463_44.
Full textSakthivel, E., R. Anitha, S. Arunachalam, and M. Hindumathy. "Detracting TCP-Syn Flooding Attacks in Software Defined Networking Environment." In Emerging Trends in Computing and Expert Technology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32150-5_89.
Full textXie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.
Full textChahal, Jasmeen Kaur, Abhinav Bhandari, and Sunny Behal. "Analysis of the Impacts of Flooding-Based DDoS Attacks on SDN-Enabled Cloud." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64064-3_14.
Full textVetrivelan, P., M. Jagannath, and T. S. Pradeep Kumar. "Network Intrusion Detection and Prevention Systems on Flooding and Worm Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch012.
Full textConference papers on the topic "Syn flooding attack"
Bosi, Lucas Leal, André Chaves Mendes, Raphael Melo Guedes, and Ronaldo Moreira Salles. "Traffic Classification in Software-Defined Networking (SDN): Application of Machine Learning Models for Flooding DDoS Attack Detection." In 2024 IEEE 3rd Industrial Electronics Society Annual On-Line Conference (ONCON). IEEE, 2024. https://doi.org/10.1109/oncon62778.2024.10931262.
Full text"SYN Flooding Attack Detection and Mitigation in SDN." In 2019 the 9th International Workshop on Computer Science and Engineering. WCSE, 2019. http://dx.doi.org/10.18178/wcse.2019.03.022.
Full textKim, DongHyuk, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, and Minho Park. "An Effective Defense Against SYN Flooding Attack in SDN." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939937.
Full textGeetha, K., and N. Sreenath. "SYN flooding attack — Identification and analysis." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033828.
Full textOo, Nan Haymarn, and Aung Htein Maw. "Effective Detection and Mitigation of SYN Flooding Attack in SDN." In 2019 19th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 2019. http://dx.doi.org/10.1109/iscit.2019.8905209.
Full textBellaiche, Martine, and Jean-Charles Gregoire. "SYN Flooding Attack Detection Based on Entropy Computing." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5425454.
Full textKukreti, Sambhavi, Sumit Kumar Modgil, Neha Gehlot, and Vinod Kumar. "DDoS Attack using SYN Flooding: A Case Study." In 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2022. http://dx.doi.org/10.23919/indiacom54597.2022.9763108.
Full textLin, Ting-Yu, Jhen-Ping Wu, Pei-Hsuan Hung, et al. "Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane." In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2020. http://dx.doi.org/10.23919/apnoms50412.2020.9236951.
Full textQibo, Sun, Wang Shangguang, Yan Danfeng, and Yang Fangchun. "ARM-CPD: Detecting SYN flooding attack by traffic prediction." In Multimedia Technology (IC-BNMT). IEEE, 2009. http://dx.doi.org/10.1109/icbnmt.2009.5348532.
Full textSahu, Rakesh Kumar, and Narendra S. Chaudhari. "A performance analysis of network under SYN-flooding attack." In 2012 Ninth International Conference on Wireless and Optical Communications Networks - (WOCN). IEEE, 2012. http://dx.doi.org/10.1109/wocn.2012.6335561.
Full textReports on the topic "Syn flooding attack"
Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4987.
Full text