Journal articles on the topic 'SYN flooding'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SYN flooding.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bang, Gihyun, Deokjai Choi, and Sangwon Bang. "A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments." Journal of Korea Multimedia Society 18, no. 1 (January 30, 2015): 35–41. http://dx.doi.org/10.9717/kmms.2015.18.1.035.
Full textRamanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textM., Jamaluddin, Touqir Anwar M., K. Saira, and M. Y. Wani. "DDoS SYN Flooding; Mitigation and Prevention." International Journal of Scientific and Engineering Research 5, no. 12 (December 24, 2014): 484–90. http://dx.doi.org/10.14299/ijser.2014.12.001.
Full textJunaid, Muhammad, Fahad Ali Khan, Ali Imran Jehangiri, Yousaf Saeed, Mehmood Ahmed, Luqman Shah, and Muhammad Naeem. "An Indigenous Solution for SYN Flooding." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 22, 2021): 2998–3022. http://dx.doi.org/10.47059/revistageintec.v11i4.2334.
Full textManna, Mehdi Ebady. "Review Of Syn-Flooding Attack Detection Mechanism." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 99–117. http://dx.doi.org/10.5121/ijdps.2012.3108.
Full textMohammadi, Reza, Reza Javidan, and Mauro Conti. "SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks." IEEE Transactions on Network and Service Management 14, no. 2 (June 2017): 487–97. http://dx.doi.org/10.1109/tnsm.2017.2701549.
Full textSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Full textBaik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (March 31, 2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.
Full textChen, Wei, and Dit-Yan Yeung. "Throttling spoofed SYN flooding traffic at the source." Telecommunication Systems 33, no. 1-3 (November 2, 2006): 47–65. http://dx.doi.org/10.1007/s11235-006-9006-0.
Full textBellaïche, Martine, and Jean-Charles Grégoire. "SYN flooding attack detection by TCP handshake anomalies." Security and Communication Networks 5, no. 7 (August 16, 2011): 709–24. http://dx.doi.org/10.1002/sec.365.
Full textWang, Shangguang, Qibo Sun, Hua Zou, and Fangchun Yang. "Detecting SYN flooding attacks based on traffic prediction." Security and Communication Networks 5, no. 10 (February 24, 2012): 1131–40. http://dx.doi.org/10.1002/sec.428.
Full textKavisankar and Chellappan. "CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack." International Journal of Network Security & Its Applications 3, no. 5 (September 30, 2011): 191–202. http://dx.doi.org/10.5121/ijnsa.2011.3515.
Full textMohammadi, Reza, Mauro Conti, Chhagan Lal, and Satish C. Kulhari. "SYN-Guard: An effective counter for SYN flooding attack in software-defined networking." International Journal of Communication Systems 32, no. 17 (July 18, 2019): e4061. http://dx.doi.org/10.1002/dac.4061.
Full textGavaskar, S., R. Surendiran, and E. Ramaraj. "Three Counter Defense Mechanism for TCP SYN Flooding Attacks." International Journal of Computer Applications 6, no. 6 (September 10, 2010): 12–15. http://dx.doi.org/10.5120/1083-1399.
Full textAbbasvand, Sara. "Defense against SYN-flooding Attacks by using Game Theory." Indian Journal of Science and Technology 7, no. 10 (October 20, 2014): 1618–24. http://dx.doi.org/10.17485/ijst/2014/v7i10.6.
Full textRahman, Arif Maulana, Henki Bayu Seta, and Ria Astriratma. "Perancangan Bot Untuk Monitoring Server Dari Serangan Distributed Denial Of Service Menggunakan JSON WEB Token." Informatik : Jurnal Ilmu Komputer 16, no. 2 (August 31, 2020): 116. http://dx.doi.org/10.52958/iftk.v16i2.2008.
Full textOrozco, Alex M. S., Augusto P. Fernandes, and Giovani H. Costa. "SIMULAÇÃO DE SYN FLOODING ATTACK NO COMMON OPEN RESEARCH EMULATOR." Revista Competência 7, no. 1 (September 26, 2014): 161–73. http://dx.doi.org/10.24936/2177-4986.v7n1.2014.156.
Full textR.C, Prathibha, and Rejimol Robinson R R. "A Comparative Study of Defense Mechanisms against SYN Flooding Attack." International Journal of Computer Applications 98, no. 18 (July 18, 2014): 16–21. http://dx.doi.org/10.5120/17282-7414.
Full textSiris, Vasilios A., and Fotini Papagalou. "Application of anomaly detection algorithms for detecting SYN flooding attacks." Computer Communications 29, no. 9 (May 2006): 1433–42. http://dx.doi.org/10.1016/j.comcom.2005.09.008.
Full textJamali, Shahram, and Vahid Shaker. "Defense against SYN flooding attacks: A particle swarm optimization approach." Computers & Electrical Engineering 40, no. 6 (August 2014): 2013–25. http://dx.doi.org/10.1016/j.compeleceng.2014.05.012.
Full textNashat, Dalia, and Fatma A. Hussain. "Multifractal detrended fluctuation analysis based detection for SYN flooding attack." Computers & Security 107 (August 2021): 102315. http://dx.doi.org/10.1016/j.cose.2021.102315.
Full textAzis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (May 31, 2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textSafa, Haidar, Mohamad Chouman, Hassan Artail, and Marcel Karam. "A collaborative defense mechanism against SYN flooding attacks in IP networks." Journal of Network and Computer Applications 31, no. 4 (November 2008): 509–34. http://dx.doi.org/10.1016/j.jnca.2007.12.004.
Full textNugraha, Muhammad, Isyana Paramita, Ardiansyah Musa, Deokjai Choi, and Buseung Cho. "Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack." Journal of Korea Multimedia Society 17, no. 8 (August 30, 2014): 988–94. http://dx.doi.org/10.9717/kmms.2014.17.8.988.
Full textVignolio, O. R., O. N. Fernández, and N. O. Maceira. "Flooding tolerance in five populations of Lotus glaber Mill. (Syn. Lotus tenuis Waldst. et. Kit.)." Australian Journal of Agricultural Research 50, no. 4 (1999): 555. http://dx.doi.org/10.1071/a98112.
Full textARFANUDIN, CITRA, Bambang Sugiantoro, and Yudi Prayudi. "ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX." Cyber Security dan Forensik Digital 2, no. 1 (July 5, 2019): 1–7. http://dx.doi.org/10.14421/csecurity.2019.2.1.1388.
Full textJamali, Shahram, and Gholam Shaker. "PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm." Computers & Mathematics with Applications 63, no. 1 (January 2012): 214–21. http://dx.doi.org/10.1016/j.camwa.2011.11.012.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textGeetha, K., and N. Sreenath. "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol." Arabian Journal for Science and Engineering 41, no. 3 (December 17, 2015): 1161–72. http://dx.doi.org/10.1007/s13369-015-1963-8.
Full textIslam, M. Mattah, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, and Muhammad Sohail. "Cyber-Security: Dos Attack Outcomes are Dangerous." European Journal of Electrical Engineering and Computer Science 5, no. 3 (June 16, 2021): 54–59. http://dx.doi.org/10.24018/ejece.2021.5.3.297.
Full textSasilatha, Dr, S. Balaji, and Dr P. Kumar. "An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks." EAI Endorsed Transactions on Energy Web 5, no. 20 (September 12, 2018): 155562. http://dx.doi.org/10.4108/eai.12-9-2018.155562.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textRahul, A., B. Suresh kumar, and S. K. Prashanth. "Detection of Intruders and Flooding in VoIP using IDS, Jacobson Fast and Hellinger Distance Algorithms." American Journal of Advanced Computing 1, no. 1 (January 1, 2020): 1–6. http://dx.doi.org/10.15864/ajac.1106.
Full textSubbulakshmi, M., S. Sujitha, A. P. Vetrivel, J. Nirmala Gandhi, and Dr K. Venkatesh Guru. "Privacy Preserving Machine Learning in Various Attacks on Security Threat Models." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 418–28. http://dx.doi.org/10.47059/revistageintec.v11i2.1678.
Full textXiao, Bin, Wei Chen, and Yanxiang He. "An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently." Journal of Parallel and Distributed Computing 68, no. 4 (April 2008): 456–70. http://dx.doi.org/10.1016/j.jpdc.2007.06.013.
Full textYu, Ming. "A nonparametric adaptive CUSUM method and its application in source-end defense against SYN flooding attacks." Wuhan University Journal of Natural Sciences 16, no. 5 (September 3, 2011): 414–18. http://dx.doi.org/10.1007/s11859-011-0772-5.
Full textNemade, Dr Sandip, Prof Manish Kumar Gurjar, and Zareena Jamaluddin. "A Novel Method for Early Detection of SYN Flooding based DoS attack in Mobile Ad Hoc Network." International Journal of Engineering Trends and Technology 7, no. 4 (January 25, 2014): 187–91. http://dx.doi.org/10.14445/22315381/ijett-v7p272.
Full textHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.
Full textHanipah, Rahma, and Harry Dhika. "ANALISA PENCEGAHAN AKTIVITAS ILEGAL DIDALAM JARINGAN DENGAN WIRESHARK." DoubleClick: Journal of Computer and Information Technology 4, no. 1 (August 27, 2020): 11. http://dx.doi.org/10.25273/doubleclick.v4i1.5668.
Full textAlipour, H., M. Esmaeili, and Kashefi Kia. "Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 49. http://dx.doi.org/10.1504/ijesdf.2009.023875.
Full textMahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.
Full textEngkilde, Michael, and Finn Surlyk. "Shallow marine syn-rift sedimentation: Middle Jurassic Pelion Formation, Jameson Land, East Greenland." Geological Survey of Denmark and Greenland (GEUS) Bulletin 1 (October 28, 2003): 813–63. http://dx.doi.org/10.34194/geusb.v1.4690.
Full textUNDERWOOD, C. J., and S. F. MITCHELL. "Mid-Cretaceous onlap history of the Market Weighton structural high, northeast England." Geological Magazine 136, no. 6 (November 1999): 681–96. http://dx.doi.org/10.1017/s0016756899003167.
Full textA. Noureldien, Noureldien, and Mashair O. Hussein. "Block Spoofed Packets at Source (BSPS): A method for Detecting and Preventing All Types of Spoofed Source IP Packets and SYN Flooding Packets at Source: A Theoretical Framework." International Journal of Networks and Communications 2, no. 3 (August 31, 2012): 33–37. http://dx.doi.org/10.5923/j.ijnc.20120203.03.
Full textStriker, Gustavo G., and Rocío A. Ploschuk. "Recovery from short-term complete submergence in temperate pasture grasses." Crop and Pasture Science 69, no. 7 (2018): 745. http://dx.doi.org/10.1071/cp18055.
Full textSurlyk, Finn. "The Jurassic of East Greenland: a sedimentary record of thermal subsidence, onset and culmination of rifting." Geological Survey of Denmark and Greenland (GEUS) Bulletin 1 (October 28, 2003): 657–722. http://dx.doi.org/10.34194/geusb.v1.4674.
Full textStrong, P. C., G. R. Wood, S. C. Lang, A. Jollands, E. Karalaus, and J. Kassan. "HIGH RESOLUTION PALAEOGEOGRAPHIC MAPPING OF THE FLUVIAL-LACUSTRINE PATCHAWARRA FORMATION IN THE COOPER BASIN, SOUTH AUSTRALIA." APPEA Journal 42, no. 1 (2002): 65. http://dx.doi.org/10.1071/aj01005.
Full textHillacre, Sean, Kevin Ansdell, and Brian McEwan. "Geology, Structural Analysis, and Paragenesis of the Arrow Uranium Deposit, Western Athabasca Basin, Saskatchewan, Canada: Implications for the Development of the Patterson Lake Corridor." Economic Geology 116, no. 2 (March 1, 2021): 285–321. http://dx.doi.org/10.5382/econgeo.4797.
Full textTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Full text