Limpar
382 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Nagarathna Ravi, S. Mercy Shalinie, Chhagan Lal, Mauro Conti,

... saturated by a flood of TCP SYN packets. SYN flood can be created using malicious spoofing of IP ... or flash crowd. The existing solutions to mitigate SYN flood against the controller does not adequately handle MAC spoofing based SYN flood, and these are unable to distinguish between flash ... novel mechanism called AEGIS, which detect and mitigate SYN flood against the controller in SDN. AEGIS runs in ... lag in the controller due to an ongoing SYN flood. If a performance degradation is detected, then AEGIS ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2020 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Network and Service Management

Artigo Revisado por pares

Yuichi Ohsita, Shingo Ata, Masayuki Murata,

... servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit ... more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot ... packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network ... explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism ...

Tópico(s): Network Traffic and Congestion Control

2006 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Communications

Artigo Revisado por pares

Chen Sun, Chengyu Hu, Liu Bin,

SYN flood attacks still dominate distributed denial of service attacks. It is a great challenge to accurately detect the SYN flood attacks which utilise skillful spoofs to evade traditional ... implemented in practice. A more accurate and fast SYN flood detection method, named SACK2, is proposed to deal with all kinds of SYN flood attacks with limited implementation costs. SACK2 exploits the behaviour of the SYN/ACK-CliACK pair to identify the victim server ...

Tópico(s): Caching and Content Delivery

2012 - Institution of Engineering and Technology | IET Information Security

Artigo Acesso aberto Revisado por pares

B. Ramkumar, T. Subbulakshmi,

... and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is ... a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) ... in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.

Tópico(s): Advanced Malware Detection Techniques

2021 - EDP Sciences | ITM Web of Conferences

Artigo Revisado por pares

Van Tuyen Dang, Trương Thu Hương, Nguyen Huu Thanh, Pham Ngoc Nam, Nguyen Ngoc Thanh, Alan Marshall,

Recently, TCP SYN flood has been the most common and serious type of Distributed Denial of Service attack that causes outages of ... Openflow/SDN network remedy to combat specifically TCP SYN flood. We show security threats for the SDN architecture ... establishment for a TCP flow connection under TCP SYN Flood attack. Using SSP to support application servers is ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2018 - Oxford University Press | The Computer Journal

Artigo Acesso aberto Revisado por pares

Zakwan Al-Arnaout, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, Ahmed Younes Shdefat,

... common type of DDoS attacks known as "TCP SYN-Flood" is studied. This type of attack uses spoofed ... the observed traffic carries the signature of TCP SYN-Flood DDoS attack and a high percentage of it is destined to a particular web server(s), it starts the tracing process by generating an IP trace packet, which accompanies the attack path recording the routers' IP addresses on the path between the attacker/daemon and the victim, which can extract the path and react properly upon receiving it by discarding any SYN packets originating from that attacker/daemon. To our ...

Tópico(s): Network Packet Processing and Optimization

2022 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo Acesso aberto

P. Karthika, Karmel Arockiasamy,

... to the SDN. Transmission control protocol-synchronized (TCP-SYN) floods, a common cyberattack that can harm SDNs, can ... based architecture for machine learning (ML) enabled TCP-SYN flood detection. This research showed that ML models like ... layered perceptron can distinguish between regular traffic and SYN flood traffic and can mitigate the impacts of the ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2023 - Institute of Advanced Engineering and Science (IAES) | Bulletin of Electrical Engineering and Informatics

Artigo Acesso aberto Revisado por pares

Kishore Babu Dasari, Nagaraju Devarakonda,

... the classification results. This research, performed operations on Syn flood, MSSQL, SSDP datasets have taken from the CIC- ... uncorrelated feature subset selected by applying intersection on Syn flood, MSSQL, and SSDP data sets PSK common uncorrelated ... based DDoS attack that's been developed with Syn flood, MSSQL, and SSDP data sets, and the results ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2022 - International Information and Engineering Technology Association | International Journal of Safety and Security Engineering

Artigo Acesso aberto Revisado por pares

Deepak Kshirsagar, Suraj Sawant, Amit Rathod, Sachin Wathore,

... detects denial of service attack such as TCP SYN Flood based on threshold and misuse detection. The system ... the load of CPU is minimized after TCP SYN flood attack detection.

Tópico(s): Internet Traffic Analysis and Secure E-voting

2016 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto

Mitko Bogdanoski, Tomislav Shuminoski, Aleksandar Risteski,

... flooding attack or more often referred as a SYN flood attack.The effects of this type of attack ... this type of attack.Finally, practical approaches against SYN flood attack for Linux and Windows environment which are ...

Tópico(s): Information and Cyber Security

2013 - | International Journal of Computer Network and Information Security

Artigo Acesso aberto Revisado por pares

Mohamed Rahouti, Kaiqi Xiong, Nasir Ghani, Mohd. Farooq Shaikh,

SYN flood attacks (half-open attacks) have been proven a serious threat to software-defined networking (SDN)-enabled ... efficacy of the mechanism to detect and mitigate SYN flood attacks within an SDN environment.

Tópico(s): Advanced Malware Detection Techniques

2021 - | IET Networks

Artigo Acesso aberto

Subhi R. M. Zeebaree, Karwan Jacksi, Rizgar R. Zebari,

... inaccessible due to various threats and attacks. Synchronization (SYN) flood Distributed Denial of Service (DDoS) is the most ... more responsiveness, efficiency and stable with and without SYN flood DDoS attack. Also, the performance of IIS 10. ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Institute of Advanced Engineering and Science (IAES) | Indonesian Journal of Electrical Engineering and Computer Science

Artigo Acesso aberto Revisado por pares

Duc‐Minh Ngo, Cuong Pham‐Quoc, Tran Ngoc Thinh,

... types of Distributed Denial of Service (DDoS) attacks, SYN flood attacks have caused serious issues for servers when ... essential demand for a sufficient approach to mitigate SYN flood attacks. In this paper, we introduce an efficient high-throughput and low-latency SYN flood defender architecture, carefully designed with a pipeline model. ... is also introduced with the architecture for estimating SYN flood protection throughput and latency. The first prototype version ... can function as standalone to alleviate high-rate SYN flood attacks and can be integrated into an OpenFlow ...

Tópico(s): Advanced Malware Detection Techniques

2018 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Toyeer-E-Ferdoush, Habibur Rahman, Mahmud Hasan,

... aims to protect the communication from DDoS TCP SYN flood attack. There are many research papers which can ... prevented much well than other model because a flood attack can detect before hampering the server and deny the connection attempt. There will be two cases studied and solved here that SYN-ACK(Synchronization-Acknowledgement) lost (no destination), SYN-ACK— ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2022 - Taylor & Francis | Journal of Discrete Mathematical Sciences and Cryptography

Capítulo de livro Acesso aberto Revisado por pares

Tomáš Halagan, Tomáš Kováčik, Peter Trúchly, Andrej Binder,

... new method for detection and type identification of SYN flood (DoS) attacks. The method allows distinguishing type of detected SYN flood attacks – random, subnet or fixed. Based on Counting ... Proof of correctness of the approach for TCP SYN flood attack detection and type identification is provided – both ...

Tópico(s): Software-Defined Networks and 5G

2015 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Xiaojun Guo, Xuan Gao,

Existing SYN flood attack detection methods have obvious problems such as poor feature selectivity, weak generalization ability, easy overfitting, and ... during training. In the paper, we present a SYN flood attack detection method based on the Hierarchical Multihad Self-Attention (HMHSA) mechanism. First, we use one-hot ...

Tópico(s): Advanced Malware Detection Techniques

2022 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Basheer Riskhan, Halawati Abd Jalil Safuan, Khalid Hussain, Asma Abbas Hassan Elnour, Abdelzahir Abdelmaboud, Fazlullah Khan, Mahwish Kundi,

... contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, ... traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an ... heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the ...

Tópico(s): Data Stream Mining Techniques

2023 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo Revisado por pares

Juan José Echevarria, Pablo Garaizar, Jon Legarda,

... to denial of service attacks. The well‐known SYN flood attack works by filling up the connection queue ... connections and SYN cookies) during a low‐rate SYN flood. We first review 2 SYN cookies implementations (ie, Linux and FreeBSD) and compare ...

Tópico(s): Advanced Malware Detection Techniques

2017 - Wiley | Software Practice and Experience

Artigo Acesso aberto Revisado por pares

Jan Alexander, Jenni Barclay, Janez Sušnik, Susan Loughlin, Richard A. Herd, Amii R. Darnell, S. Crosweller,

... volume and intensity, older volcanic debris, pre- and syn-flood tephra fall and the extent of pre-flood ... of changed runoff behaviour caused by the widespread syn-flood tephra deposition and importantly the widespread vegetation damage ...

Tópico(s):

2010 - Elsevier BV | Journal of Volcanology and Geothermal Research

Artigo Revisado por pares

Bo Hang, Ruimin Hu, Wei Shi,

... already become the greatest threat to the network. SYN Flood attack is one of the most common distributed ... can be an effective defense against the TCP SYN Flood attack with a lower complexity.

Tópico(s): Anomaly Detection Techniques and Applications

2011 - Academy Publisher | Journal of Networks

Artigo Acesso aberto Revisado por pares

M. Siva Niranjan Raja, A. R. Vasudevan,

... monitoring single event source. In this paper, TCP SYN flood attack is considered. RETE algorithm is applied on the network event attributes to formulate the rules and stored in database. An alert is triggered, when the rule for TCP SYN attack is matched.

Tópico(s): Network Packet Processing and Optimization

2017 - Elsevier BV | Procedia Computer Science

Artigo Revisado por pares

Saeed Javanmardi, Mohammad Shojafar, Reza Mohammadi, Amin Nazari, Valerio Persico, Antonio Pescapè,

... devices are more vulnerable to several attacks. TCP SYN flood attack is one of the most common denial ... paper, we apply SDN concepts to address TCP SYN flood attacks in IoT–fog networks . We propose FUPE, ...

Tópico(s): Network Security and Intrusion Detection

2021 - Elsevier BV | Journal of Information Security and Applications

Artigo Acesso aberto Revisado por pares

Sehrish Batool, Farrukh Zeeshan Khan, Syed Qaiser Ali Shah, Muneer Ahmed, Roobaea Alroobaea, Abdullah M. Baqasah, Ihsan Ali, Muhammad Ahsan Raza,

... has been suggested to detect and mitigate TCP SYN flood DDoS attacks. The proposed algorithm uses a three- ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2022 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Ilija Bašičević, Stanislav Očovaj, Miroslav Popović,

... been compared. The simulated attack is Synchronize packet (SYN) flood. A simple packet distribution, that is, entropy of ...

Tópico(s): Statistical Mechanics and Entropy

2015 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto

P. Arun Raj Kumar, S. Selvakumar,

High rate flooding attacks such as SYN flood, UDP flood, and HTTP flood have been posing a perilous threat to Web servers, DNS servers, Mail servers, VoIP servers, etc.These ... identifies three types of flooding attacks, viz., the SYN Flood, UDP flood, and HTTP Flood, effectively with detection ...

Tópico(s): Advanced Malware Detection Techniques

2012 - | International Journal of Computer Network and Information Security

Capítulo de livro Acesso aberto Revisado por pares

Xin Li, Zhenzhou Ji, Mingzeng Hu,

... available resource improve securities of protected hosts against SYN flood attack. Experimental results show that the new architecture ...

Tópico(s): Network Traffic and Congestion Control

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Λέανδρος Μαγλαράς, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha,

... challenges, we propose mitigation of fog computing-based SYN Flood DDoS attacks using an adaptive neuro-fuzzy inference ... our system is for detecting and mitigating TCP-SYN floods and DDoS attacks.

Tópico(s): Internet Traffic Analysis and Secure E-voting

2024 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto

Dmitrii G. Bukhanov, Vladimir M. Polyakov, Dmitrii A. Uskov, Feras Daeef,

The paper provides an overview of approaches detection SYN flood attacks in local area networks based on the ... FIN packets.An approach is proposed to counter SYN flood attacks, based on the use of low-level ... WinPcap.The paper describes the algorithm for detecting SYN flood attack.On the basis of the proposed approach ...

Tópico(s): Security and Verification in Computing

2015 - International Academy Of Theoretical & Applied Science | Theoretical & Applied Science

Capítulo de livro Revisado por pares

Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata,

... paper, we propose a distributed detecting method for SYN Flood attack which exploits a flow in TCP itself. Our proposed system employs mobile agents to detect SYN Flood attack. We also show the effectiveness of our proposal through experiment of detection of SYN Flood attack in virtual network of simulation environment.

Tópico(s): Network Packet Processing and Optimization

2009 - Springer Science+Business Media | Lecture notes in computer science