2008 IEEE International Conference on E-Business Engineering 2008
DOI: 10.1109/icebe.2008.18
|View full text |Cite
|
Sign up to set email alerts
|

Detecting SYN Flooding Agents under Any Type of IP Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Divakaran et al (2016) proposed an approach to detect SYN flooding based on the linear prediction analysis using the difference of outgoing SYN and incoming SYN/ACK segments [6]. Nashat et al (2008) developed an approach for detecting TCP SYN flooding attacks by using SYN and SYN/ACK segments with packets header information [7]. In this approach, the Counting Bloom filter (CBF) has been used to classify all incoming SYN/ACK segments, and then CUSUM chart has been applied to make a final decision [7].…”
Section: Introductionmentioning
confidence: 99%
“…Divakaran et al (2016) proposed an approach to detect SYN flooding based on the linear prediction analysis using the difference of outgoing SYN and incoming SYN/ACK segments [6]. Nashat et al (2008) developed an approach for detecting TCP SYN flooding attacks by using SYN and SYN/ACK segments with packets header information [7]. In this approach, the Counting Bloom filter (CBF) has been used to classify all incoming SYN/ACK segments, and then CUSUM chart has been applied to make a final decision [7].…”
Section: Introductionmentioning
confidence: 99%
“…The authors of Ref. [7] proposed a scheme to detect the flooding agents by considering all the possible kinds of IP spoofing, which is based on the SYN/SYN-ACK protocol pair with the consideration of packet header information. The Counting Bloom Filter is used to classify all the incoming SYN-ACK packets to the sub network into two streams, and the CUSUM algorithm is applied to make the detection decision by the two normalized differences, one of which is the difference between the number of SYN packets and the number of the first SYN-ACK packets and the other one is the difference between the number of the firs SYN-ACK packets and the number of the retransmission SYN-ACK.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, this traceback can be performed by "post mortem" after an attack has completed. Dalia et al [5] proposed a scheme to detect the flooding agents by considering all the possible kinds of IP spoofing. The proposed scheme is based on the TCP SYN-SYN/ACK protocol pair with the consideration of packet header information.…”
Section: Related Workmentioning
confidence: 99%