An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently

2008 ◽  
Vol 68 (4) ◽  
pp. 456-470 ◽  
Author(s):  
Bin Xiao ◽  
Wei Chen ◽  
Yanxiang He
2008 ◽  
Vol 31 (4) ◽  
pp. 509-534 ◽  
Author(s):  
Haidar Safa ◽  
Mohamad Chouman ◽  
Hassan Artail ◽  
Marcel Karam

2017 ◽  
Vol 14 (2) ◽  
pp. 487-497 ◽  
Author(s):  
Reza Mohammadi ◽  
Reza Javidan ◽  
Mauro Conti

2011 ◽  
Vol 181-182 ◽  
pp. 66-71 ◽  
Author(s):  
Fei Xian Sun ◽  
Zhi Gang Wu

This paper explores a novel danger theory based model to aware the situation for TCP SYN flooding attacks. Within in the presented model, the TCP SYN flooding attacks are looked as dangerous exogenous patterns, and induce danger signals to aware the situation of host computers, which is realized by hosted-based artificial immune detectors. After summarizing the danger theory, the model framework, correlative concepts, TCP SYN flooding attack detection, danger signal computation and attack situation awareness methods are described. Following that, the interrelated techniques are compared. Theoretical analysis results show that the proposed model is valid. Thus, it provides a good solution to computer network security.


Sign in / Sign up

Export Citation Format

Share Document