CFP last date
22 April 2024
Reseach Article

A Comparative Study of Defense Mechanisms against SYN Flooding Attack

by Prathibha R. C, Rejimol Robinson R R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 18
Year of Publication: 2014
Authors: Prathibha R. C, Rejimol Robinson R R
10.5120/17282-7414

Prathibha R. C, Rejimol Robinson R R . A Comparative Study of Defense Mechanisms against SYN Flooding Attack. International Journal of Computer Applications. 98, 18 ( July 2014), 16-21. DOI=10.5120/17282-7414

@article{ 10.5120/17282-7414,
author = { Prathibha R. C, Rejimol Robinson R R },
title = { A Comparative Study of Defense Mechanisms against SYN Flooding Attack },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 18 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number18/17282-7414/ },
doi = { 10.5120/17282-7414 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:30.957833+05:30
%A Prathibha R. C
%A Rejimol Robinson R R
%T A Comparative Study of Defense Mechanisms against SYN Flooding Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 18
%P 16-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to consume enough server resources and to make the system unable to respond to legitimate traffic. It is a threat to the network as the flooding of packets may delay other legitimate users from accessing the server and in severe cases may result the server to be shut down, wasting valuable resources. The objective of this paper is to review the detection mechanisms for SYN flooding. The advantages and disadvantages for some detection schemes are examined and their performance is compared.

References
  1. Saman Taghavi Zargar, James Joshi & David Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", Communications Surveys & Tutorials, IEEE, Volume:15 , Issue: 4, pp. 2049-2069, March 2013.
  2. Mehdi Ebady Manna, Angela Amphawan, "Review of SYN flooding attack detection mechanism", International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 1, January 2012.
  3. S. Changhua, Jindou, F. , Lei, S. , & Bin, L. , "A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks," in IEEE INFOCOM (Poster), Anchorage, Alaska, USA, 2007.
  4. L. Yun, Ye, G. , & Guiyi, W. , "Detect SYN Flooding Attack in Edge Routers," International Journal of Security and Its Applications (IJSIA), vol. 3, pp. 31-45, 2009.
  5. C. Chin-Ling, " A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test," Journal of Universal Computer Science, vol. 15, pp. 488-503,2009.
  6. L. Fang-Yie, & Chia-Chi, P. , "Detecting DoS and DDoS Attacks using Chi-Square," in Fifth International Conference on Information Assurance and Security (IAS), Xian, 2009, pp. 255 – 258.
  7. L. M. Ibrahim, "Anomly Network Intrusion Detection System Based On Distributed Time-Delay Neural Network (DTDNN)," Journal of Engineering Science and Technology, vol. 5, pp. 457-471, 2010.
  8. Josep L. Berral, Nicolas Poggi, Javier Alonso, Ricard Gavalda, Jordi Torres, Manish Parashar , "Adaptive Distributed Mechanism Against Flooding Network Attacks Based on Machine Learning", Proceedings of ACM workshop on AISec, pp. 43-50, 2008.
  9. B. Al-Duwairi and G. Manimaran, " Intentional Dropping: A novel scheme for SYN flooding mitigation", in Global Internet Symposium, 2005.
  10. T. Peng, C. Leckie, and K. Ramamohanaroa, "Survey of network based defense mechanisms countering the DoS and DDoS Defense problems", ACM Comput. Surv. 39, 1, /article 3, April 2007.
  11. J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communications Review, vol. 24, no. 2, pp. 39-53, April 2004.
  12. R. K. C. Chang, "Defending against flooding-based distributed denial of service attacks: A tutorial", Computer J. IEEE Commun. Magazine, Vol. 40, no. 10, pp. 42-51, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Denial of Service (DDoS) Flooding attack SYN-Flood