2022 IEEE International Conference on Data Science and Information System (ICDSIS) 2022
DOI: 10.1109/icdsis55133.2022.9915949
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Researchers have proposed various methods to address DDoS attacks on networks. In the study by Kumar and Gowda [6], the research addresses the issue of DDoS attacks on IoT systems by proposing a model that utilizes the Ethereum blockchain. The proposed model not only tackles the problem of single points of failure, privacy, and security in IoT systems but also provides a decentralized platform for preventing DDoS attacks at the application layer.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Researchers have proposed various methods to address DDoS attacks on networks. In the study by Kumar and Gowda [6], the research addresses the issue of DDoS attacks on IoT systems by proposing a model that utilizes the Ethereum blockchain. The proposed model not only tackles the problem of single points of failure, privacy, and security in IoT systems but also provides a decentralized platform for preventing DDoS attacks at the application layer.…”
Section: Related Workmentioning
confidence: 99%
“…Where, the attacker launches a synchronized attack that overwhelms the target's bandwidth, processing power, or application layer resources [4] and thus, the distributed denial-of-service attack depends in its essence mainly on exploiting a network of compromised devices, such as computers, smartphones, and cameras, known as botnets, in order to flood the target network or servers with a huge amount of data traffic [5]. This large flood of data traffic consumes the resources available in the target, preventing the systems from dealing with and responding to authorized requests [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the task in [18] was to develop an efficient model for detecting and mitigating DDoS attacks induced by TCP SYN flood in SDN environments. Additionally, the objective in [19] was to develop a system capable of detecting SYN flood attacks based on the power generated during connection establishment, but this is a challenging undertaking due to the limitations and vulnerabilities of wireless sensor networks. In [20], the primary challenge is to detect TCP SYN flood attacks in a multitenant cloud environment from the perspective of a cloud service provider.…”
Section: *Author For Correspondencementioning
confidence: 99%