Journal articles on the topic 'Syn flooding attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Syn flooding attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ramanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textAli, Hamid M., Ibraheem K. Ibraheem, and Sarah W. A. Ahmad. "Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack." Journal of Engineering 19, no. 6 (2023): 786–94. http://dx.doi.org/10.31026/j.eng.2013.06.10.
Full textSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Full textMohd Fuzi, Mohd Faris, Nur Fatin Mohammad Ashraf, and Muhammad Nabil Fikri Jamaluddin. "Integrated Network Monitoring using Zabbix with Push Notification via Telegram." Journal of Computing Research and Innovation 7, no. 1 (2022): 147–55. http://dx.doi.org/10.24191/jcrinn.v7i1.282.
Full textYang, Chun-Hao, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, and Meng-Hsun Tsai. "Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists." Sensors 23, no. 8 (2023): 3817. http://dx.doi.org/10.3390/s23083817.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textManna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textAzis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.
Full textS, Nithish Babu, Yogesh V, Mariswaran S, and Gowtham N. "Detection of DDOS Attack using Decision Tree Classifier in SDN Environment." Journal of Ubiquitous Computing and Communication Technologies 5, no. 2 (2023): 193–202. http://dx.doi.org/10.36548/jucct.2023.2.006.
Full textBellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (2011): 709–24. http://dx.doi.org/10.1002/sec.365.
Full textBang, Gihyun, Deokjai Choi, and Sangwon Bang. "A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments." Journal of Korea Multimedia Society 18, no. 1 (2015): 35–41. http://dx.doi.org/10.9717/kmms.2015.18.1.035.
Full textIslam, M. Mattah, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, and Muhammad Sohail. "Cyber-Security: Dos Attack Outcomes are Dangerous." European Journal of Electrical Engineering and Computer Science 5, no. 3 (2021): 54–59. http://dx.doi.org/10.24018/ejece.2021.5.3.297.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textKavisankar and Chellappan. "CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack." International Journal of Network Security & Its Applications 3, no. 5 (2011): 191–202. http://dx.doi.org/10.5121/ijnsa.2011.3515.
Full textMohammadi, Reza, Mauro Conti, Chhagan Lal, and Satish C. Kulhari. "SYN-Guard: An effective counter for SYN flooding attack in software-defined networking." International Journal of Communication Systems 32, no. 17 (2019): e4061. http://dx.doi.org/10.1002/dac.4061.
Full textARFANUDIN, CITRA, Bambang Sugiantoro, and Yudi Prayudi. "ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX." Cyber Security dan Forensik Digital 2, no. 1 (2019): 1–7. http://dx.doi.org/10.14421/csecurity.2019.2.1.1388.
Full textWang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textJasvir, Markandy1 Manmohan Sharma2. "DIMINISH THE FLOODING ATTACK USING MUTUAL AUTHENTICATION IN MOBILE AD-HOC NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 5 (2018): 24–30. https://doi.org/10.5281/zenodo.1241365.
Full textNashat, Dalia, and Fatma A. Hussain. "Multifractal detrended fluctuation analysis based detection for SYN flooding attack." Computers & Security 107 (August 2021): 102315. http://dx.doi.org/10.1016/j.cose.2021.102315.
Full textR.C, Prathibha, and Rejimol Robinson R R. "A Comparative Study of Defense Mechanisms against SYN Flooding Attack." International Journal of Computer Applications 98, no. 18 (2014): 16–21. http://dx.doi.org/10.5120/17282-7414.
Full textOrozco, Alex M. S., Augusto P. Fernandes, and Giovani H. Costa. "SIMULAÇÃO DE SYN FLOODING ATTACK NO COMMON OPEN RESEARCH EMULATOR." Revista Competência 7, no. 1 (2014): 161–73. http://dx.doi.org/10.24936/2177-4986.v7n1.2014.156.
Full textRahul, A., B. Suresh kumar, and S. K. Prashanth. "Detection of Intruders and Flooding in VoIP using IDS, Jacobson Fast and Hellinger Distance Algorithms." American Journal of Advanced Computing 1, no. 1 (2020): 1–6. http://dx.doi.org/10.15864/ajac.1106.
Full textNugraha, Muhammad, Isyana Paramita, Ardiansyah Musa, Deokjai Choi, and Buseung Cho. "Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack." Journal of Korea Multimedia Society 17, no. 8 (2014): 988–94. http://dx.doi.org/10.9717/kmms.2014.17.8.988.
Full textRavichandran, S., and M. Umamaheswari. "Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM." Asian Journal of Computer Science and Technology 6, no. 2 (2017): 27–32. http://dx.doi.org/10.51983/ajcst-2017.6.2.1783.
Full textShah, Sayed Qaiser Ali, Farrukh Zeeshan Khan, and Muneer Ahmad. "Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN." Computer Communications 182 (January 2022): 198–211. http://dx.doi.org/10.1016/j.comcom.2021.11.008.
Full textGeetha, K., and N. Sreenath. "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol." Arabian Journal for Science and Engineering 41, no. 3 (2015): 1161–72. http://dx.doi.org/10.1007/s13369-015-1963-8.
Full textHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (2021): 1980. http://dx.doi.org/10.3390/s21061980.
Full textOussama, Sbai, and Elboukhari Mohamed. "Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks." International Journal of Artificial Intelligence (IJ-AI) 11, no. 3 (2022): 878–85. https://doi.org/10.11591/ijai.v11.i3.pp878-885.
Full textOkafor, P. U., S. N. Arinze, and C. Uka. "Development of Java Logical Program Synchronous Floods Distributed Denial of Service Algorithm, for Improving Data Security at Backend Server." International Journal of Information Sciences and Engineering 6, no. 2 (2022): 1–10. https://doi.org/10.5281/zenodo.7151791.
Full textPriambodo, Dimas Febriyan, Achmad Husein Noor Faizi, Fika Dwi Rahmawati, Septia Ulfa Sunaringtyas, Jeckson Sidabutar, and Tiyas Yulita. "Collaborative Intrusion Detection System with Snort Machine Learning Plugin." JOIV : International Journal on Informatics Visualization 8, no. 3 (2024): 1230. http://dx.doi.org/10.62527/joiv.8.3.2018.
Full textNemade, Dr Sandip, Prof Manish Kumar Gurjar, and Zareena Jamaluddin. "A Novel Method for Early Detection of SYN Flooding based DoS attack in Mobile Ad Hoc Network." International Journal of Engineering Trends and Technology 7, no. 4 (2014): 187–91. http://dx.doi.org/10.14445/22315381/ijett-v7p272.
Full textRama, Koteswara Rao G., Prasad R. Satya, Sastri A. Pathanjali, and E. S. N. Prasad P. "ENHANCING THE IMPREGNABILITY OF LINUX SERVERS." International Journal of Network Security & Its Applications (IJNSA) 6, no. 2 (2014): 21–31. https://doi.org/10.5281/zenodo.6516347.
Full textAmru, Malothu, Raju Jagadeesh Kannan, Enthrakandi Narasimhan Ganesh, et al. "Network intrusion detection system by applying ensemble model for smart home." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 3 (2024): 3485. http://dx.doi.org/10.11591/ijece.v14i3.pp3485-3494.
Full textAmru, Malothu, Kannan Raju Jagadeesh, Ganesh Enthrakandi Narasimhan, et al. "Network intrusion detection system by applying ensemble model for smart home." Network intrusion detection system by applying ensemble model for smart home 14, no. 3 (2024): 3485–94. https://doi.org/10.11591/ijece.v14i3.pp3485-3494.
Full textSöğüt, Esra, and O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems." Applied Sciences 13, no. 10 (2023): 5993. http://dx.doi.org/10.3390/app13105993.
Full textRao, Gottapu Sankara, and P. Krishna Subbarao. "A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 244–53. http://dx.doi.org/10.17762/ijritcc.v11i9.8340.
Full textTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Full textNan, Haymarn Oo, Cahyadi Risdianto Aris, Chaw Ling Teck, and Htein Maw Aung. "Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold Algorithm." International Journal of Computer Networks & Communications (IJCNC) 12, no. 3 (2020): 75–95. https://doi.org/10.5281/zenodo.3946219.
Full textMohammadi, Reza, Reza Javidan, and Mauro Conti. "SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks." IEEE Transactions on Network and Service Management 14, no. 2 (2017): 487–97. http://dx.doi.org/10.1109/tnsm.2017.2701549.
Full textKim, Jong-Min, Hong-Ki Kim, and Joon-Hyung Lee. "Comparative Analysis of Effective Algorithm Techniques for the Detection of Syn Flooding Attacks." Jouranl of Information and Security 23, no. 5 (2023): 73–79. http://dx.doi.org/10.33778/kcsa.2023.23.5.073.
Full textMowla, Nishat, Inshil Doh, and Kijoon Chae. "CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word." Computer Science and Information Systems 15, no. 1 (2018): 163–85. http://dx.doi.org/10.2298/csis170328044m.
Full textDumka, Ankur, Alaknanda Ashok, and Parag Verma. "Performance Analysis of DDoS Attack on SDN and Proposal of Cracking Agorithm." International Journal of Information Technology Project Management 11, no. 4 (2020): 1–12. http://dx.doi.org/10.4018/ijitpm.2020100101.
Full textChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, et al. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Full textHan, Yu, Liumei Zhang, Yichuan Wang, Xi Deng, Zhendong Gu, and Xiaohui Zhang. "Research on the Security of IPv6 Communication Based on Petri Net under IoT." Sensors 23, no. 11 (2023): 5192. http://dx.doi.org/10.3390/s23115192.
Full textBaik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.
Full textWang, Shangguang, Qibo Sun, Hua Zou, and Fangchun Yang. "Detecting SYN flooding attacks based on traffic prediction." Security and Communication Networks 5, no. 10 (2012): 1131–40. http://dx.doi.org/10.1002/sec.428.
Full textGavaskar, S., R. Surendiran, and E. Ramaraj. "Three Counter Defense Mechanism for TCP SYN Flooding Attacks." International Journal of Computer Applications 6, no. 6 (2010): 12–15. http://dx.doi.org/10.5120/1083-1399.
Full textAbbasvand, Sara. "Defense against SYN-flooding Attacks by using Game Theory." Indian Journal of Science and Technology 7, no. 10 (2014): 1618–24. http://dx.doi.org/10.17485/ijst/2014/v7i10.6.
Full textJean, Tajer Mo Adda*1 &. Benjamin Aziz2. "DETECTION OF FLOODING ATTACKS ON MOBILE AGENTS USING SKETCH TECHNIQUE AND DIVERGENCE MEASURES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 112–21. https://doi.org/10.5281/zenodo.839137.
Full text