2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) 2018
DOI: 10.1109/mobilecloud.2018.00014
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an OpenFlow-Based TCP SYN Flood Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Gambar 1. Proses TCP three-way handshake Sementara itu, serangan SYN flood terjadi ketika klien mengirimkan sejumlah besar paket SYN ke tiap port mesin target dan tidak merespons paket SYN-ACK server dengan ACK [13]. Akibatnya, server terus menunggu paket ACK yang akhirnya menyebabkan koneksi setengah terbuka (halfopen connection) antara klien dan server.…”
Section: B Serangan Syn Floodunclassified
“…Gambar 1. Proses TCP three-way handshake Sementara itu, serangan SYN flood terjadi ketika klien mengirimkan sejumlah besar paket SYN ke tiap port mesin target dan tidak merespons paket SYN-ACK server dengan ACK [13]. Akibatnya, server terus menunggu paket ACK yang akhirnya menyebabkan koneksi setengah terbuka (halfopen connection) antara klien dan server.…”
Section: B Serangan Syn Floodunclassified
“…Developers can design and distribute applications. However this flexibility as a way of innovation can be constrained if an adversary decides to launch a malicious application with rogue intentions [25]. Figure 1a shows the threat that leverages the inability of the controller to completely identify the various network applications that make changes to network in the SDN architecture.…”
Section: System Callmentioning
confidence: 99%
“…That is to say the ability to implement "TCP SYN Checking" will almost certainly result in an attack on the network. Thus, we have a special case in which an attack surface has been established [12]. The TCP SYN checking function, as a result, can protect the transmission from TCP state-based attacks [13].…”
Section: Introductionmentioning
confidence: 99%