2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM) 2017
DOI: 10.1109/icrtccm.2017.55
|View full text |Cite
|
Sign up to set email alerts
|

Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…This variation aimed to determine the suitability of Levy walk as prototypical similarity with DDoS potential features. In [16], the authors experimented with the clever subject of comedy measurement that utilizes a conference seeking philosophy and a brilliant channel that sets shares in the traditional way. Multilayer perceptron with genetic algorithm (MLP-GA) is proposed in [17] to detect DDoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This variation aimed to determine the suitability of Levy walk as prototypical similarity with DDoS potential features. In [16], the authors experimented with the clever subject of comedy measurement that utilizes a conference seeking philosophy and a brilliant channel that sets shares in the traditional way. Multilayer perceptron with genetic algorithm (MLP-GA) is proposed in [17] to detect DDoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The flooding or Denial of service (DoS) attack harms this significant feature by prohibiting the legitimate customers from accessing the network resources. To serve the purpose of consuming servers processing power and the network capacity (bandwidth), the attackers commence producing DoS attacks by means of transmitting countless requests so the legitimate users become incapable of accessing the network even they are eligible for legitimate access to the network resources [5].…”
Section: A) Denial Of Service (Dos)mentioning
confidence: 99%
“…Kavisankar et al[20] proposed a SYN spoofing Detection and Mitigation Scheme. A Bloom Filter is used to store the legitimate IP addresses.…”
mentioning
confidence: 99%