To see the other types of publications on this topic, follow the link: SYN flooding.

Journal articles on the topic 'SYN flooding'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SYN flooding.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bang, Gihyun, Deokjai Choi, and Sangwon Bang. "A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments." Journal of Korea Multimedia Society 18, no. 1 (January 30, 2015): 35–41. http://dx.doi.org/10.9717/kmms.2015.18.1.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.

Full text
Abstract:
A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

M., Jamaluddin, Touqir Anwar M., K. Saira, and M. Y. Wani. "DDoS SYN Flooding; Mitigation and Prevention." International Journal of Scientific and Engineering Research 5, no. 12 (December 24, 2014): 484–90. http://dx.doi.org/10.14299/ijser.2014.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Junaid, Muhammad, Fahad Ali Khan, Ali Imran Jehangiri, Yousaf Saeed, Mehmood Ahmed, Luqman Shah, and Muhammad Naeem. "An Indigenous Solution for SYN Flooding." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 22, 2021): 2998–3022. http://dx.doi.org/10.47059/revistageintec.v11i4.2334.

Full text
Abstract:
SYN flooding is one of the most challenging problems that many networks applications face, particularly those that are security-related. Disrupting a server's daily function and assigning it to other tasks leaves it a constantly busy server that processes little usable data. In this research, a comprehensive INDIGSOL approach is demonstrated that not only detects SYN flooding but also prevents the attacker(s) from making such attempts in the future. The designed approach has four modules such as node registration and validation, packet capturing, dynamic check system, and hook activation. The approach is further checked and compared with some state-of-the-art baselines on various parameters like detection time, response/processing time, and number of malicious packets detection. It is observed that INDIGSOL performed better than other baselines with an average accuracy of 99% malicious packet detection in six scenarios along with 13.4% faster detection time and 11.2% faster response/processing time. Overall, the provided solution is scalable, robust, and highly accurate that prevents SYN flooding in a timely manner.
APA, Harvard, Vancouver, ISO, and other styles
5

Manna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammadi, Reza, Reza Javidan, and Mauro Conti. "SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks." IEEE Transactions on Network and Service Management 14, no. 2 (June 2017): 487–97. http://dx.doi.org/10.1109/tnsm.2017.2701549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.

Full text
Abstract:
This paper explores a novel danger theory based model to aware the situation for TCP SYN flooding attacks. Within in the presented model, the TCP SYN flooding attacks are looked as dangerous exogenous patterns, and induce danger signals to aware the situation of host computers, which is realized by hosted-based artificial immune detectors. After summarizing the danger theory, the model framework, correlative concepts, TCP SYN flooding attack detection, danger signal computation and attack situation awareness methods are described. Following that, the interrelated techniques are compared. Theoretical analysis results show that the proposed model is valid. Thus, it provides a good solution to computer network security.
APA, Harvard, Vancouver, ISO, and other styles
8

Baik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (March 31, 2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Wei, and Dit-Yan Yeung. "Throttling spoofed SYN flooding traffic at the source." Telecommunication Systems 33, no. 1-3 (November 2, 2006): 47–65. http://dx.doi.org/10.1007/s11235-006-9006-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (August 16, 2011): 709–24. http://dx.doi.org/10.1002/sec.365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Shangguang, Qibo Sun, Hua Zou, and Fangchun Yang. "Detecting SYN flooding attacks based on traffic prediction." Security and Communication Networks 5, no. 10 (February 24, 2012): 1131–40. http://dx.doi.org/10.1002/sec.428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kavisankar and Chellappan. "CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack." International Journal of Network Security & Its Applications 3, no. 5 (September 30, 2011): 191–202. http://dx.doi.org/10.5121/ijnsa.2011.3515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mohammadi, Reza, Mauro Conti, Chhagan Lal, and Satish C. Kulhari. "SYN-Guard: An effective counter for SYN flooding attack in software-defined networking." International Journal of Communication Systems 32, no. 17 (July 18, 2019): e4061. http://dx.doi.org/10.1002/dac.4061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gavaskar, S., R. Surendiran, and E. Ramaraj. "Three Counter Defense Mechanism for TCP SYN Flooding Attacks." International Journal of Computer Applications 6, no. 6 (September 10, 2010): 12–15. http://dx.doi.org/10.5120/1083-1399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Abbasvand, Sara. "Defense against SYN-flooding Attacks by using Game Theory." Indian Journal of Science and Technology 7, no. 10 (October 20, 2014): 1618–24. http://dx.doi.org/10.17485/ijst/2014/v7i10.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rahman, Arif Maulana, Henki Bayu Seta, and Ria Astriratma. "Perancangan Bot Untuk Monitoring Server Dari Serangan Distributed Denial Of Service Menggunakan JSON WEB Token." Informatik : Jurnal Ilmu Komputer 16, no. 2 (August 31, 2020): 116. http://dx.doi.org/10.52958/iftk.v16i2.2008.

Full text
Abstract:
Untuk mengamankan sebuah server diperlukan sistem monitoring agar meminimalisir resiko jika terjadi percobaan intrusi. Contoh serangan yang dapat mengancam server adalah serangan DDOS (Distributed Denial of Service). Berdasarkan permasalahan tersebut, diperlukan sebuah bot untuk melakukan monitoring server dari serangan DDOS, dalam penelitian ini difokuskan serangan DDOS berjenis UDP Flooding dan SYN Flooding. Monitoring server memanfaatkan bot untuk mendeteksi serangan DDOS berjenis UDP Flooding dan SYN Flooding dengan membatasi jumlah paket yang dikirimkan kepada port yang dibuka oleh server, apabila jumlah paket yang dikirimkan lebih dari 100 paket per detik maka bot akan mengidentifikasi pengiriman tersebut sebagai serangan. Penerapan metode JSON Web Token agar bisa dioperasikan oleh bot admin server yakni dengan mengimplementasikan package JSON Web Token pada bot lalu memanggil fungsi encode agar JSON Web Token dapat melakukan enkripsi pada klaim yang berisikan data penyerang oleh bot, sehingga bot admin server dapat mengamankan klaim yang akan dikirimkan ke admin server.
APA, Harvard, Vancouver, ISO, and other styles
17

Orozco, Alex M. S., Augusto P. Fernandes, and Giovani H. Costa. "SIMULAÇÃO DE SYN FLOODING ATTACK NO COMMON OPEN RESEARCH EMULATOR." Revista Competência 7, no. 1 (September 26, 2014): 161–73. http://dx.doi.org/10.24936/2177-4986.v7n1.2014.156.

Full text
Abstract:
Este trabalho aborda a utilização do Common Open Research Emulator (CORE) como plataforma para a simulação de ataques de negação de serviço (DoS - De-nial of Service), como o ataque de inundação de SYN. O CORE permite facilmente projetar uma topologia de rede fictícia e definir serviços a serem executados nos componentes da rede. Com base na infraestrutura projetada, o ataque é disparado, e os dados que trafegam pela rede são analisados através de uma ferramenta de IDS/IPS (Intrusion Detection and Prevention System). Após a detecção do ataque, contramedidas são aplicadas buscando interromper o fluxo de dados entre o atacante e a vítima. De forma a efetivar as contramedidas, são utilizadas as ferramentas SNORT e Guardian. Esta estrutura permite que o processo de simulação ocorra antes de efetivar a aquisição da infraestrutura, diminuindo o índice de risco do projeto. Este ambiente permite também as atividades de ensino e treinamento na área de redes de computadores e segurança da informação e comunicação de forma simples.P a l a v r a s - c h a v e : CORE. Ataque de negação de serviço. Sistema de prevenção e detecção de intrusões.
APA, Harvard, Vancouver, ISO, and other styles
18

R.C, Prathibha, and Rejimol Robinson R R. "A Comparative Study of Defense Mechanisms against SYN Flooding Attack." International Journal of Computer Applications 98, no. 18 (July 18, 2014): 16–21. http://dx.doi.org/10.5120/17282-7414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Siris, Vasilios A., and Fotini Papagalou. "Application of anomaly detection algorithms for detecting SYN flooding attacks." Computer Communications 29, no. 9 (May 2006): 1433–42. http://dx.doi.org/10.1016/j.comcom.2005.09.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jamali, Shahram, and Vahid Shaker. "Defense against SYN flooding attacks: A particle swarm optimization approach." Computers & Electrical Engineering 40, no. 6 (August 2014): 2013–25. http://dx.doi.org/10.1016/j.compeleceng.2014.05.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Nashat, Dalia, and Fatma A. Hussain. "Multifractal detrended fluctuation analysis based detection for SYN flooding attack." Computers & Security 107 (August 2021): 102315. http://dx.doi.org/10.1016/j.cose.2021.102315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Azis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (May 31, 2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.

Full text
Abstract:
AbstrakAbstrak - Kebutuhan pada jaringan mengutamakan performa untuk mendukung sebuah efisiensi jaringan merupakan hal penting untuk saat ini. Penentuan konfigurasi yang semakin banyak dan kompleks serta kontrol jaringan yang semakin rumit, membuat jaringan semakin tidak fleksibel dan susah untuk diterapkan pada sebuah topologi jaringan yang besar. Software Defined Network (SDN) muncul dengan mekanisme yang dapat menyelesaikan masalah tersebut. Pada dasarnya konsep dari Software Defined Network (SDN) adalah memisahkan kontroller dan data/forwarding plane, sehingga mampu untuk me-menejemen jaringan yang begitu banyak dalam sebuah kontroller. Namun pada kontroller belum memiliki keamanan yang cukup untuk melindungi dari serangan jaringan seperti DDoS, SYN Flooding Attack sehingga kontroller akan menjadi target dari attacker. Sehingga penelitian ini mengusulkan penambahan aplikasi machine learning pada kontroller untuk menangani serangan seperti DDoS dan SYN Flooding Attack. Dalam penelitian ini kontroller yang digunakan adalah ryu controller yang menggunakan bahasa pemrograman python. Dalam penelitian ini menggunakan topologi linear pada mininet dan membuat paket dalam format .pcap untuk pengujian serangan yang dilakukan. Sehingga dapat mengetahui rata-rata jumlah paket yang masuk dan keluar dan keberhasilan dalam melakukan mitigasi terhadap paket yang dianggap DDoS.Abstract The need for the network to prioritize performance to support a network efficiency is important for now. Determination of configurations that are more and more complex and increasingly complicated network control, makes the network more inflexible and difficult to apply to a large network topology. Software Defined Network (SDN) appears with a mechanism that can solve the problem. Basically the concept of Software Defined Network (SDN) is to separate the controller and the data / forwarding plane, so that it is able to manage so many networks in a controller. But the controller does not have enough security to protect against network attacks such as DDoS, SYN Flooding Attack so the controller will be the target of the attacker. So this study proposes adding machine learning applications to controllers to handle attacks such as DDoS and SYN Flooding Attack. In this study the controller used is the Ryu controller that uses the Python programming language. In this study using a linear topology on Mininet and create a package in. Pcap format for testing attacks carried out. So as to know the average number of incoming and outgoing packages and success in mitigating packages that are considered DDoS.
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.

Full text
Abstract:
Advanced computer network technology enables the connectivity of computers in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and cannot detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We propose a network-based intrusion detection model using fuzzy cognitive maps (FCM) that detects intrusion by Denial of Service (DoS) attack detection using packet analysis. A DoS attack typically appears as a Probe and Syn Flooding attack. Syn Flooding Preventer using Fuzzy cognitive maps (SPuF) model captures and analyzes packet information to detect Syn flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulation using the "KDD’99 Competition Data Set" for the SPuF model shows that Probe detection exceeded 97%.
APA, Harvard, Vancouver, ISO, and other styles
24

Safa, Haidar, Mohamad Chouman, Hassan Artail, and Marcel Karam. "A collaborative defense mechanism against SYN flooding attacks in IP networks." Journal of Network and Computer Applications 31, no. 4 (November 2008): 509–34. http://dx.doi.org/10.1016/j.jnca.2007.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Nugraha, Muhammad, Isyana Paramita, Ardiansyah Musa, Deokjai Choi, and Buseung Cho. "Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack." Journal of Korea Multimedia Society 17, no. 8 (August 30, 2014): 988–94. http://dx.doi.org/10.9717/kmms.2014.17.8.988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Vignolio, O. R., O. N. Fernández, and N. O. Maceira. "Flooding tolerance in five populations of Lotus glaber Mill. (Syn. Lotus tenuis Waldst. et. Kit.)." Australian Journal of Agricultural Research 50, no. 4 (1999): 555. http://dx.doi.org/10.1071/a98112.

Full text
Abstract:
Lotus glaber Mill. is a herbaceous legume, tolerant to flooding, that in a few decades has colonised the Flooding Pampa grasslands, an extensive wetland of 90 000 km in central-east Argentina. In this study, the growth and nodulation of flooded plants in 5 local populations were evaluated. Thirty-day-old seedlings, grown in pots, were flooded outdoors during 4 months. Stem, leaf, and root biomass, as well as the number of nodules per plant, were lower in flooded plants than in non-flooded ones. In flooded plants, the submerged portions of stems were hypertrophied and populations differed in the proportion of plants with adventitious roots. Flood tolerance was significantly related to the proportion of plants with adventitious roots in stems of each population. A positive relationship was shown between the proportion of plants with adventitious root and number of nodules per plant. The plants were also tolerant of low temperatures and ice-sheeting of water. These results underline the importance of morphological adaptations related to the maintenance of plant functionality under flooding conditions. The results provide evidence of the existence of characters related to flooding tolerance, which should be taken into account in ecological studies and agronomic selection programs
APA, Harvard, Vancouver, ISO, and other styles
27

ARFANUDIN, CITRA, Bambang Sugiantoro, and Yudi Prayudi. "ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX." Cyber Security dan Forensik Digital 2, no. 1 (July 5, 2019): 1–7. http://dx.doi.org/10.14421/csecurity.2019.2.1.1388.

Full text
Abstract:
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region. Security Information and Event Management (SIEM) is a security technology to secure information assets. SIEM is expected to provide information on attacks that occur on the router network and increase the value of the Indeks KAMI of government agencies. However, the use of SIEM is still questionable whether it can recognize a router attack and its impact on the value of our index. This research simulates attacks on routers with 8 attacks namely Mac Flooding, ARP-Poisoning, CDP Flooding, DHCP Starvation, DHCP Rogue, SYN Flooding SSH Bruteforce and FTP Bruteforce. 8 types of attacks followed by digital forensic analysis using the OSCAR method to see the impact on routers and SIEM. Also measured is index KAMI before and after the SIEM to be able to measure the effect of SIEM installation on the value of index KAMI. It was found that the use of SIEM to conduct security monitoring proved successful in identifying attacks, but not all were recognized by SIEM. SIEM only recognizes DHCP Starvation, DHCP Rogue, SSH Bruteforce and FTP Bruteforce. Mac Flooding, ARP-Poisoning, CDP Flooding, SYN Flooding attacks are not recognized by SIEM because routers do not produce logs. Also obtained is the use of SIEM proven to increase our index from the aspect of technology
APA, Harvard, Vancouver, ISO, and other styles
28

Jamali, Shahram, and Gholam Shaker. "PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm." Computers & Mathematics with Applications 63, no. 1 (January 2012): 214–21. http://dx.doi.org/10.1016/j.camwa.2011.11.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.

Full text
Abstract:
Distributed Denial of Service Attack (DDoS) has emerged as a major threat to cyber space. A DDoS attack aims at exhausting the resources of the victim causing financial and reputational damages to it. The availability of free software make launching of DDoS attacks easy. The difficulty in differentiating a DDoS traffic from a legitimate traffic burst such as a flash crowd makes DDoS difficult to be identified. A wide range of techniques have been used in conventional networks to detect and mitigate DDoS attacks. Though the advent of Software Defined Networking (SDN) makes a network easy to be managed even SDN is vulnerable to DDoS attacks. In this case, the controller of the SDN gets overloaded with the incoming packets from the switches. In fact, a solution based on security analytics can be put in place to ward off this threat as a proactive security measure using the flow level statistics available from the SDN. Compared to the packet analysis used in traditional networks which is resource expensive the flow level statistics is relatively inexpensive. This paper focuses on the design and implementation of an attack detection system for detecting the flooding DDoS attacks TCP SYN flooding attacks, HTTP request flooding attacks, UDP flooding attacks and ICMP flooding attacks over SDN network traffic. The system uses various classification algorithms to classify a traffic into normal or attack. The feature sets for classification were arrived at using a feature selection module with ANOVA (Analysis of Variance) F-Test statistical method. Performance evaluation of each of the classifiers was carried out for the three feature sets obtained from the feature selection module using various performance measures and the results have been tabulated. The feature set which gives the best performance in detecting malicious traffic has been identified.
APA, Harvard, Vancouver, ISO, and other styles
30

Geetha, K., and N. Sreenath. "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol." Arabian Journal for Science and Engineering 41, no. 3 (December 17, 2015): 1161–72. http://dx.doi.org/10.1007/s13369-015-1963-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Islam, M. Mattah, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, and Muhammad Sohail. "Cyber-Security: Dos Attack Outcomes are Dangerous." European Journal of Electrical Engineering and Computer Science 5, no. 3 (June 16, 2021): 54–59. http://dx.doi.org/10.24018/ejece.2021.5.3.297.

Full text
Abstract:
Dos attacks are an attractive and hot topic nowadays because it is very common for attackers to make a victim and exploit it. In this paper, different kinds of techniques and commands have implemented and contrast for the outcomes of these attacks. By performing, experiments problems are identified. By following experiments, the goal is prevention and mitigation of Dos attacks at large extent by knowing the outcomes of the attacks. For proving the work, different types of experiments are performed on different platforms and observed that Dos attacks are how dangerous to our systems. In this paper, hping3 and syn flooding are performed. Hping3 is used for sending packets in a modified, crafted form. It is the networking tool used by developers to perform a DOS attack. SYN flooding is used for sending so many requests in an insane amount to the server and used all of the resources of the server.
APA, Harvard, Vancouver, ISO, and other styles
32

Sasilatha, Dr, S. Balaji, and Dr P. Kumar. "An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks." EAI Endorsed Transactions on Energy Web 5, no. 20 (September 12, 2018): 155562. http://dx.doi.org/10.4108/eai.12-9-2018.155562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.
APA, Harvard, Vancouver, ISO, and other styles
34

Rahul, A., B. Suresh kumar, and S. K. Prashanth. "Detection of Intruders and Flooding in VoIP using IDS, Jacobson Fast and Hellinger Distance Algorithms." American Journal of Advanced Computing 1, no. 1 (January 1, 2020): 1–6. http://dx.doi.org/10.15864/ajac.1106.

Full text
Abstract:
VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP or UDP Protocols. This protocol structure is almost as same as HTTP Protocol, i.e. for every request there will be some response, even though the request is invalid. HTTP Protocol is prone to flooding attacks, like SYN-Flood attack. Because of Session Initiation Protocol (SIP) is same as HTTP, SIP is also prone to Flooding attacks. The proposed Intrusion Detection System (IDS) is used to detect the intruders in telephony system. Genetic algorithm is used to recognize the authorized user. VoIP Flood Detection System (VFDS) is aimed to detect TCP Flooding attacks and SIP Flooding attacks on SIP devices using Jacobian Fast and Hellinger distance algorithms. The Jacobian Fast Algorithm fixes the threshold limit and Hellinger distance calculation is a statistical anomaly based algorithm uses to detect deviation in traffic
APA, Harvard, Vancouver, ISO, and other styles
35

Subbulakshmi, M., S. Sujitha, A. P. Vetrivel, J. Nirmala Gandhi, and Dr K. Venkatesh Guru. "Privacy Preserving Machine Learning in Various Attacks on Security Threat Models." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 418–28. http://dx.doi.org/10.47059/revistageintec.v11i2.1678.

Full text
Abstract:
Intrusion Detection System(IDS) is regularly used to recognize and forestall strange practices in an organization the executives framework. The fundamental thought of IDS is to utilize highlight esteems from network bundle catch system to characterize whether a conduct is anomalous. Notwithstanding, most customary order calculations are unequipped for perceiving obscure practices. The aim of the project is to review the state-of-the art of detection mechanisms of SYN flooding. The detection schemes for SYN Flooding attacks classified broadly into three categories – detection schemes based on the router data structure, statistical analysis of the packet flow based on artificial intelligence. The advantages and disadvantages for various detection schemes under each category have been critically examined Additionally, this crossover methodology for the proposed calculation is pointed toward improving the exactness of strange conduct identification of such a framework, diminishing the calculation season of an arrangement calculation, and making it feasible for the IDS to perceive the obscure and new variation assaults in an organization climate. The test results shows that the proposed calculation outflanks the wide range of various order calculations thought about in this paper regarding the precision.
APA, Harvard, Vancouver, ISO, and other styles
36

Xiao, Bin, Wei Chen, and Yanxiang He. "An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently." Journal of Parallel and Distributed Computing 68, no. 4 (April 2008): 456–70. http://dx.doi.org/10.1016/j.jpdc.2007.06.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yu, Ming. "A nonparametric adaptive CUSUM method and its application in source-end defense against SYN flooding attacks." Wuhan University Journal of Natural Sciences 16, no. 5 (September 3, 2011): 414–18. http://dx.doi.org/10.1007/s11859-011-0772-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Nemade, Dr Sandip, Prof Manish Kumar Gurjar, and Zareena Jamaluddin. "A Novel Method for Early Detection of SYN Flooding based DoS attack in Mobile Ad Hoc Network." International Journal of Engineering Trends and Technology 7, no. 4 (January 25, 2014): 187–91. http://dx.doi.org/10.14445/22315381/ijett-v7p272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.

Full text
Abstract:
In this paper, we aim to detect distributed denial of service (DDoS) attacks, and receive a notification of destination service, changing immediately, without the additional efforts of other modules. We designed a kernel-based mechanism to build a new Transmission Control Protocol/Internet Protocol (TCP/IP) connection smartly by the host while the users or clients not knowing the location of the next host. Moreover, we built a lightweight flooding attack detection mechanism in the user mode of an operating system. Given that reinstalling a modified operating system on each client is not realistic, we managed to replace the entry of the system call table with a customized sys_connect. An effective defense depends on fine detection and defensive procedures. In according with our experiments, this novel mechanism can detect flooding DDoS successfully, including SYN flood and ICMP flood. Furthermore, through cooperating with a specific low cost network architecture, the mechanism can help to defend DDoS attacks effectively.
APA, Harvard, Vancouver, ISO, and other styles
40

Hanipah, Rahma, and Harry Dhika. "ANALISA PENCEGAHAN AKTIVITAS ILEGAL DIDALAM JARINGAN DENGAN WIRESHARK." DoubleClick: Journal of Computer and Information Technology 4, no. 1 (August 27, 2020): 11. http://dx.doi.org/10.25273/doubleclick.v4i1.5668.

Full text
Abstract:
<p>Faktor kemanan jaringan computer adalah satu hal yang mutlak dalam membangun suatu jaringan. Pada dasarnya sistem keamanan yang dimiliki oleh sistem operasi tidaklah cukup untuk mengamankan jaringan komputer. Oleh karena itu untuk mendapatkan sebuah keamanan jaringan computer maka diperlukan suatu tools yang dapat mendeteksi adanya suatu mekanisme serangan dari jaringan. Jenis serangan yang terjadi bisa <em>flooding</em> ataupun <em>syn flood</em>. Dimana tujuan serangan ini adalah untuk membuat komputer yang mengakses tidak bisa berjalan dengan normal jaringan komputer. Wireshark merupakan software yang dapat menganalisa aktivitas jaringan komputer sehingga dapat membantu mendeteksi serangan yang akan terjadi sehingga pengguna tidak perlu khawatir dengan serangan tersebut.</p>
APA, Harvard, Vancouver, ISO, and other styles
41

Alipour, H., M. Esmaeili, and Kashefi Kia. "Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 49. http://dx.doi.org/10.1504/ijesdf.2009.023875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.

Full text
Abstract:
Information Communication Technology (ICT) environment in traditional power grids makes detection and mitigation of DDoS attacks more challenging. Existing security technologies, besides their efficiency, are not adequate to cater to DDoS security in Smart Grids (SGs) due to highly distributed and dynamic network environments. Recently, emerging Software Defined Networking- (SDN-) based approaches are proposed by researchers for SG’s DDoS protection; however, they are only able to protect against flooding attacks and are dependent on static thresholds. The proposed approach, i.e., Software Defined Networking-based DDoS Protection System (S-DPS), is efficiently addressing these issues by employing light-weight Tsallis entropy-based defense mechanisms using SDN environment. It provides early detection mechanism with mitigation of anomaly in real time. The approach offers the best deployment location of defense mechanism due to the centralized control of network. Moreover, the employment of a dynamic threshold mechanism is making detection process adaptive to the changing network conditions. S-DPS has demonstrated its effectiveness and efficiency in terms of Detection Rate (DR) and minimal CPU/RAM utilization, considering DDoS protection focusing smurf attacks, socket stress attacks, and SYN flood attacks.
APA, Harvard, Vancouver, ISO, and other styles
43

Engkilde, Michael, and Finn Surlyk. "Shallow marine syn-rift sedimentation: Middle Jurassic Pelion Formation, Jameson Land, East Greenland." Geological Survey of Denmark and Greenland (GEUS) Bulletin 1 (October 28, 2003): 813–63. http://dx.doi.org/10.34194/geusb.v1.4690.

Full text
Abstract:
The Middle Jurassic Pelion Formation – Fossilbjerget Formation couplet of Jameson Land, East Greenland, is a well-exposed example of the Middle Jurassic inshore–offshore successions characteristic of the rifted seaways in the Northwest European – North Atlantic region. Early Jurassic deposition took place under relatively quiet tectonic conditions following Late Permian – earliest Triassic and Early Triassic rift phases and the Lower Jurassic stratal package shows an overall layer-cake geometry. A long-term extensional phase was initiated in Middle Jurassic (Late Bajocian) time, culminated in the Late Jurassic (Kimmeridgian–Volgian), and petered out in the earliest Cretaceous (Valanginian). The Upper Bajocian – Middle Callovian early-rift succession comprises shallow marine sandstones of the Pelion Formation and correlative offshore siltstones of the Fossilbjerget Formation. Deposition was initiated by southwards progradation of shallow marine sands of the Pelion Formation in the Late Bajocian followed by major backstepping in Bathonian–Callovian times and drowning of the sandy depositional system in the Middle–Late Callovian. Six facies associations are recognised in the Pelion–Fossilbjerget couplet, representing estuarine, shoreface, offshore transition zone and offshore environments. The north–southtrending axis of the Jameson Land Basin had a low inclination, and deposition was sensitive to even small changes in relative sea level which caused the shorelines to advance or retreat over tens to several hundreds of kilometres. Eight composite sequences, termed P1–P8, are recognised and are subdivided into a total of 28 depositional sequences. The duration of the two orders of sequences was about 1–2 Ma and 360,000 years, respectively. The Upper Bajocian P1–2 sequences include the most basinally positioned shallow marine sandstones, deposited during major sealevel lowstands. The lowstands were terminated by significant marine flooding events, during which sandstone deposition was restricted to northern, more proximal parts of the basin. The Upper Bajocian – Middle Bathonian P3–4 sequences show an overall progradational stacking pattern. The sequence boundary at the top of P4 marks a significant shift in stacking pattern, and the Upper Bathonian – Middle Callovian P5–8 sequences show large-scale backstepping, terminating in a widespread condensed succession at the distal, southern end of the basin. The largescale backstepping was governed by combined tectonically-induced subsidence, reflecting increased rates of extension, and eustatic sea-level rise. The depositional trends of the Pelion Formation – Fossilbjerget Formation couplet provide a well-exposed analogue to contemporaneous subsurface deposits which form major hydrocarbon reservoirs on the west Norway shelf, and in the Northern North Sea.
APA, Harvard, Vancouver, ISO, and other styles
44

UNDERWOOD, C. J., and S. F. MITCHELL. "Mid-Cretaceous onlap history of the Market Weighton structural high, northeast England." Geological Magazine 136, no. 6 (November 1999): 681–96. http://dx.doi.org/10.1017/s0016756899003167.

Full text
Abstract:
The mid-Cretaceous sediments of northeast England were deposited at the western margin of the southern North Sea Basin, with sedimentation occurring in a range of tectonic settings. Detailed analysis of the areal distribution and sedimentary facies of Aptian to earliest Cenomanian sediments has allowed the pattern of onlap onto the Market Weighton structural high and changes in relative sea level to be documented. Successive onlap episodes during the Early Aptian, Late Aptian and Early Albian culminated in the final flooding of the structure during the Late Albian (varicosum Subzone). Sea-level curves generated from coastal onlap patterns are difficult to relate to published ‘global’ sea-level curves due to the high frequency of the fluctuations in relative sea level observed. Despite this, detailed correlation and analysis of sedimentological events suggest that even the most expanded, basinal succession is relatively incomplete. This study has also shown that the change from dominantly syn-tectonic to dominantly post-tectonic sedimentation style occurred in the late Early Albian.
APA, Harvard, Vancouver, ISO, and other styles
45

A. Noureldien, Noureldien, and Mashair O. Hussein. "Block Spoofed Packets at Source (BSPS): A method for Detecting and Preventing All Types of Spoofed Source IP Packets and SYN Flooding Packets at Source: A Theoretical Framework." International Journal of Networks and Communications 2, no. 3 (August 31, 2012): 33–37. http://dx.doi.org/10.5923/j.ijnc.20120203.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Striker, Gustavo G., and Rocío A. Ploschuk. "Recovery from short-term complete submergence in temperate pasture grasses." Crop and Pasture Science 69, no. 7 (2018): 745. http://dx.doi.org/10.1071/cp18055.

Full text
Abstract:
The ability to recover from the impact of short-term submergence was assessed on four widely used grasses in pastures: Dactylis glomerata L., Bromus catharticus Vahl., Schedonorus arundinaceus Schreb. (syn. Festuca arundinacea) and Phalaris aquatica L. Six-week-old plants were subjected to a 5-day complete submergence in clear water, followed by a 15-day recovery period. Dry mass after submergence, shoot and root growth, number of tillers per plant, leaf stomatal conductance and leaf greenness during recovery were assessed. Dactylis glomerata and B. catharticus were sensitive to submergence, showing very low relative growth rate (RGR) of shoots and roots during recovery (37–67% lower than controls) along with early leaf senescence and persistent partial stomatal closure. Schedonorus arundinaceus exhibited an intermediate tolerance, sustaining high RGR of shoots (similar to controls) and fully adjusting its leaf functionality during recovery despite being affected during submergence (40% decrease in dry mass and 37% in tiller number). Phalaris aquatica performed outstandingly, with dry mass unaffected by submergence, and unaltered stomatal conductance, leaf greenness, tillering and shoot growth during recovery. Therefore, in areas where flooding can often cause plant submergence, P. aquatica is recommended whereas the other species are not, because they may be outcompeted by flood-tolerant species.
APA, Harvard, Vancouver, ISO, and other styles
47

Surlyk, Finn. "The Jurassic of East Greenland: a sedimentary record of thermal subsidence, onset and culmination of rifting." Geological Survey of Denmark and Greenland (GEUS) Bulletin 1 (October 28, 2003): 657–722. http://dx.doi.org/10.34194/geusb.v1.4674.

Full text
Abstract:
The Late Palaeozoic – Mesozoic extensional basin complex of East Greenland contains a record of deposition during a period of Rhaetian – Early Bajocian thermal subsidence, the onset of rifting in the Late Bajocian, its growth during the Bathonian–Kimmeridgian, culmination of rifting in the Volgian – Early Ryazanian, and waning in the Late Ryazanian – Hauterivian. The area was centred over a palaeolatitude of about 45°N in the Rhaetian and drifted northwards to about 50°N in the Hauterivian. A major climate change from arid to humid subtropical conditions took place at the Norian–Rhaetian transition. Deposition was in addition governed by a long-term sea-level rise with highstands in the Toarcian–Aalenian, latest Callovian and Kimmeridgian, and lowstands in the latest Bajocian – earliest Bathonian, Middle Oxfordian and Volgian. The Rhaetian – Lower Bajocian succession is considered the upper part of a megasequence, termed J1, with its base in the upper Lower Triassic, whereas the Upper Bajocian – Hauterivian succession forms a complete, syn-rift megasequence, termed J2. The southern part of the basin complex in Jameson Land contains a relatively complete Rhaetian–Ryazanian succession and underwent only minor tilting during Middle Jurassic – earliest Cretaceous rifting. Rhaetian – Lower Jurassic deposits are absent north of Jameson Land and this region was fragmented into strongly tilted fault blocks during the protracted rift event. The syn-rift successions of the two areas accordingly show different long-term trends in sedimentary facies. In the southern area, the J2 syn-rift megasequence forms a symmetrical regressive–transgressive–regressive cycle, whereas the J2 megasequence in the northern area shows an asymmetrical, stepwise deepening trend. A total of eight tectonostratigraphic sequences are recognised in the Rhaetian–Hauterivian interval. They reflect major changes in basin configuration, drainage systems, sediment transport and distribution patterns, and in facies and depositional environments. The sequences are bounded by regional unconformities or flooding surfaces and have average durations in the order of 10 Ma. They are subdivided into conventional unconformity-bounded depositional sequences with durations ranging from tens of thousands of years, in the Milankovitch frequency band, up to several million years. Deposition was alluvial and lacustrine in the Rhaetian–Sinemurian, but almost exclusively marine during the Pliensbachian–Hauterivian time interval when a marine strait, up to 500 km wide and more than 2000 km long, developed between Greenland and Norway, connecting the Arctic Sea and the North Sea. Coal-bearing fluvial and paralic deposits occur, however, at the base of the onlapping Middle Jurassic succession in the central and northern part of the basin complex. The sedimentary development is similar to that in the Northern North Sea and on the Norwegian shelf, and East Greenland offers important onshore analogues for virtually all of the types of deeply buried Jurassic depositional systems of these areas and especially their hydrocarbon reservoirs.
APA, Harvard, Vancouver, ISO, and other styles
48

Strong, P. C., G. R. Wood, S. C. Lang, A. Jollands, E. Karalaus, and J. Kassan. "HIGH RESOLUTION PALAEOGEOGRAPHIC MAPPING OF THE FLUVIAL-LACUSTRINE PATCHAWARRA FORMATION IN THE COOPER BASIN, SOUTH AUSTRALIA." APPEA Journal 42, no. 1 (2002): 65. http://dx.doi.org/10.1071/aj01005.

Full text
Abstract:
Fluvial-lacustrine reservoirs in coal-bearing strata provide a particular challenge for reservoir characterisation because of the dominance of coal on the seismic signature and the highly variable reservoir geometry, quality and stratigraphic connectivity. Geological models for the fluvial gas reservoirs in the Permian Patchawarra Formation of the Cooper Basin are critical to minimise the perceived reservoir risks of these relatively deep targets. This can be achieved by applying high-resolution sequence stratigraphic concepts and finescaled seismic mapping. The workflow begins with building a robust regional chronostratigraphic framework, focussing on widespread lacustrine flooding surfaces and unconformities, tied to seismic scale reflectors. This framework is refined by identification of local surfaces that divide the Patchawarra Formation into high-resolution genetic units. A log facies scheme is established based on wireline log character, and calibrated to cores and cuttings, supported by analogue studies, such as the modern Ob River system in Western Siberia. Stacking patterns within each genetic unit are used to determine depositional systems tracts, which can have important reservoir connectivity implications. This leads to the generation of log signature maps for each interval, from which palaeogeographic reconstructions are generated. These maps are drawn with the guiding control of syn-depositional structural features and net/ gross trends. Estimates of fluvial channel belt widths are based on modern and ancient analogues. The resultant palaeogeography maps are used with structural and production data to refine play concepts, as a predictive tool to locate exploration and development drilling opportunities, to assess volumetrics, and to improve drainage efficiency and recovery during production of hydrocarbons.
APA, Harvard, Vancouver, ISO, and other styles
49

Hillacre, Sean, Kevin Ansdell, and Brian McEwan. "Geology, Structural Analysis, and Paragenesis of the Arrow Uranium Deposit, Western Athabasca Basin, Saskatchewan, Canada: Implications for the Development of the Patterson Lake Corridor." Economic Geology 116, no. 2 (March 1, 2021): 285–321. http://dx.doi.org/10.5382/econgeo.4797.

Full text
Abstract:
Abstract Recent significant discoveries of uranium mineralization in the southwestern Athabasca basin, northern Saskatchewan, Canada, have been associated with a series of geophysical conductors along a NE- to SW-trending structural zone, termed the Patterson Lake corridor. The Arrow deposit (indicated mineral resource: 256.6 Mlb U3O8; grade 4.03% U3O8) is along this trend, hosted exclusively in basement orthogneisses of the Taltson domain, and is the largest undeveloped uranium deposit in the basin. This study is the first detailed analysis of a deposit along this corridor and examines the relationships between the ductile framework and brittle reactivation of structures, mineral paragenesis, and uranium mineralization. Paragenetic information from hundreds of drill core samples and thin sections was integrated with structural analysis utilizing over 18,000 measurements of various structural features. The structural system at Arrow is interpreted as a partitioned, strike-slip–dominated, brittle-ductile fault system of complex Riedel-style geometry. The system developed along subvertical, NE- to SW-trending dextral high-strain zones formed syn- to post-D3 deformation, which were the focus of extensive premineralization metasomatism (quartz flooding, sericitization, chloritization), within the limb domain of a regional-scale fold structure. These zones evolved through post-Athabasca dextral and sinistral reactivation events, creating brittle fault linkages and dilation zones, allowing for hydrothermal fluid migration and resulting uraninite precipitation and associated alteration (white mica, chlorite, kaolinite, hematite, quartz veins). This study of the structural context of Arrow is important as it emphasizes that protracted reactivation of deep-seated structures and their subsidiaries was a fundamental control on uranium mineralization in the southwestern Athabasca basin.
APA, Harvard, Vancouver, ISO, and other styles
50

Tung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.

Full text
Abstract:
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography