2007
DOI: 10.17487/rfc4987
|View full text |Cite
|
Sign up to set email alerts
|

TCP SYN Flooding Attacks and Common Mitigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
127
0
5

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 203 publications
(132 citation statements)
references
References 5 publications
0
127
0
5
Order By: Relevance
“…For example, TCP's "Nagle" algorithm [RFC1122] can be disabled, improving communication latency at the expense of more frequent --but still congestion controlled --packet transmissions. Another example is the TCP SYN cookie mechanism [RFC4987], which is available on many platforms. TCP with SYN cookies does not require a server to maintain per-connection state until the connection is established.…”
Section: Udp Usage Guidelinesmentioning
confidence: 99%
“…For example, TCP's "Nagle" algorithm [RFC1122] can be disabled, improving communication latency at the expense of more frequent --but still congestion controlled --packet transmissions. Another example is the TCP SYN cookie mechanism [RFC4987], which is available on many platforms. TCP with SYN cookies does not require a server to maintain per-connection state until the connection is established.…”
Section: Udp Usage Guidelinesmentioning
confidence: 99%
“…In practice, these trees are used for threat elicitation and analysis-representing threats at a high-level of abstraction-and have tended not to be used to capture low-level or concrete security configuration detail. For example, while a threat tree may identify a firewall countermeasure for a Denial of Service attack, a conventional threat tree is not effective, or intended to model, for example, distinctions between Syn-Proxy versus Syn-Threshold configurations [16] for a firewall in a subnet that is downstream from other similarly configured firewalls. In the latter case, much of the semantics of the threats and corresponding countermeasures are implicit and outside of the threat tree structure.…”
Section: Threat Treesmentioning
confidence: 99%
“…For example, while a threat tree may identify a firewall countermeasure for a Denial of Service attack, a threat tree is not effective, or intended to model low-level configuration details. For example, distinctions between SYN-proxy versus SYN-threshold configurations [16] for a firewall in a subnet downstream from other similarly configured firewalls. In the latter case much of semantics of the threats and corresponding countermeasures are implicit and outside of the threat tree structure.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, a NAC policy should prohibit incoming packets claiming to originate from the internal network. Similarly both [6,23] are examples of best practice with regard to mitigating DoS attacks. Countermeasures synDoSLimit and synDoSDrop introduced in Section 4 are examples of DoS catalogue countermeasures.…”
Section: Configuration Recommendation Synthesismentioning
confidence: 99%
“…In practice these trees are used for threat elicitation and analysis: representing threats at a high-level of abstraction and they tend not to be used to capture low-level or concrete security configuration detail. For example, while a threat tree may identify a firewall countermeasure for a Denial of Service attack, it is not advantageous/intended to model, for example, the distinctions between SYN-proxy versus SYN-threshold configurations [6] for a firewall in a sub-net that is downstream from other similarly configured firewalls. In the latter case much of semantics of the threats and countermeasures must be modeled implicitly and outside of the tree structure.…”
Section: Introductionmentioning
confidence: 99%