2005
DOI: 10.1007/11602897_19
|View full text |Cite
|
Sign up to set email alerts
|

Session Table Architecture for Defending SYN Flood Attack

Abstract: Stateful Inspection has become a classical technology for network firewall. Existing session table architectures of Stateful Inspection firewalls cause high time cost of timeout processing. A new architecture is proposed. The new architecture divides a session entry into two separate parts, and designs different data structures for each other. On the base of multi-queue architecture, dynamical timeouts according to available resource improve securities of protected hosts against SYN flood attack. Experimental … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
7
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 1 publication
1
7
0
Order By: Relevance
“…The mechanism used the natural properties of the splay tree firewall, and a session table architecture that is based on session attributes separation to deal with costly timeout attribute. In [31], fast session table manipulation algorithm is proposed to improve session timeout process. The algorithm covers multi-queue architectures however; it defends hosts only against SYN flood attack.…”
Section: Related Workmentioning
confidence: 99%
“…The mechanism used the natural properties of the splay tree firewall, and a session table architecture that is based on session attributes separation to deal with costly timeout attribute. In [31], fast session table manipulation algorithm is proposed to improve session timeout process. The algorithm covers multi-queue architectures however; it defends hosts only against SYN flood attack.…”
Section: Related Workmentioning
confidence: 99%
“…Actually, most of existing researches were intended to investigate the architecture and processing of session table for the purpose of providing stronger security protection and increase firewall availability and scalability [12], [22], [16], [18], [23].…”
Section: B Stateful Packet Filtering Firewallmentioning
confidence: 99%
“…These various settings of the timeout threshold implies that choosing a proper timeout value is not straightforward, motivating us to investigate the CFR algorithms. Calibrating TCP session-level time-outs is explored in [8], [11]. Kim et al [8] demonstrated that a long time-out threshold under SYN flooding results in a session table explosion.…”
Section: Related Workmentioning
confidence: 99%
“…To remove or disable entire set of stale (not recently touched) flows from memory, time-outs can generally be managed to evict outdated flows using a "touch bit" at the flow level [5], [10]. However, a time-out threshold [11], [8] has a trade-off in protecting flow memory and prematurely purging flows. If time-out is too short, it is less vulnerable to malicious attacks but active flows could be falsely removed.…”
Section: Introductionmentioning
confidence: 99%