2011
DOI: 10.1002/sec.365
|View full text |Cite
|
Sign up to set email alerts
|

SYN flooding attack detection by TCP handshake anomalies

Abstract: We present an original approach to identify synchronize (SYN) flooding attacks from the victim's side, on the basis of a classification of the different forms that TCP handshakes can take during a connection set-up between a client and a server (e.g. for Web traffic). We first identify the unusual handshake sequences that result from an attack and show how such observations can be used for SYN flooding attack detection. We then introduce a data structure to monitor, in real time, the state of the TCP handshake… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…There are many research works on TCP SYN flood attacks such as [11], [12], [13], however very few research works on TCP FIN flood attacks. Yoon et al [14] discuss defense against general TCP Flooding Attack including the TCP FIN attacks.…”
Section: Related Workmentioning
confidence: 99%
“…There are many research works on TCP SYN flood attacks such as [11], [12], [13], however very few research works on TCP FIN flood attacks. Yoon et al [14] discuss defense against general TCP Flooding Attack including the TCP FIN attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Basically, we can detect TCP SYN flooding in a node by checking the number of current half-opened TCP connection. Even though, there are many enhanced ways presented to detect TCP SYN attacks [4,8], finding out the effective detection scheme is out of focus of this paper 3) . Although a compromised node by TCP SYN flooding cannot allow TCP connection requests from others, it can broadcasts TCP SYN flooding warning messages to the neighboring nodes using other communication methods.…”
Section: Fig 4 Example Scenariomentioning
confidence: 99%
“…We divide this range into four intervals assigned to each of the risk classes: low, medium, high, and critical. Once again, we chose decomposing into equivalent intervals: [0, 3] for low class, [4,7] for medium class, [8,11] for high class, and [12,14] is assigned to the critical class. In Table 4, we present two scenarios of risk classification: likelihood being more important than impact, and conversely.…”
Section: Risk Classificationmentioning
confidence: 99%
“…A TCP SYN flood is an attack on the transport layer. In a network, connection sessions are initiated between a client and a server by exchanging special SYN–ACK segments.…”
Section: Introductionmentioning
confidence: 99%