Self-managing defense against SYN-flooding attacks

نویسندگان

  • Gholam Shaker
  • Shahram Jamali
چکیده

SYN-flooding attack uses the weakness available in TCP’s three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases PSA (probability of success of attack) and decreases BUE (buffer utilization efficiency) in the victim host and results to decreased performance of the host. This paper proposes a self-managing approach, in which the host defends against SYNflooding attack by dynamically tuning off its own two parameters, that is, m (maximum number of halfopen connections) and h (hold time for each half-open connection). In this way, it formulates the defense problem, an optimization problem and then employs the particle swarm optimization (PSO) algorithm to solve it. The simulation results show that the proposed defense strategy improves performance of the under attack system in terms of BUE and PSA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata

SYN-flooding attack uses the weakness available in TCP’s threeway handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (probability of loss) and Pa (buffer occupancy percentage of attack requests) and decreases Pr (buffer occupancy percentage of regular requ...

متن کامل

An Active Defense Mechanism for TCP SYN flooding attacks

Distributed denial-of-service attacks on public servers have recently become a serious problem. To assure that network services will not be interrupted and more effective defense mechanisms to protect against malicious traffic, especially SYN floods. One problem in detecting SYN flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from tho...

متن کامل

Defense against SYN Flooding Attacks: A Scheduling Approach

The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flo...

متن کامل

A Comparative Study of Defense Mechanisms against SYN Flooding Attack

Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients. A SYN flood is a form of denial-of-service attack. An attacker sends SYN requests continuously to a target system to consume enough server resources and to make the system unable to respond to legitim...

متن کامل

An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently

Distributed denial of service (DDoS) attacks seriously threaten Internet services yet there is currently no defence against such attacks that provides both early detection, allowing time for counteraction, and an accurate response. Traditional detection methods rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. Current counteractions such as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012