Throttling spoofed SYN flooding traffic at the source

نویسندگان

  • Wei Chen
  • Dit-Yan Yeung
چکیده

3 Abstract TCP-based flooding attacks are a common form of Distributed Denial-of-Service 4 (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. 5 Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among 6 different IP spoofing techniques, which include random spoofing, subnet spoofing and fixed 7 spoofing, subnet spoofing is the most difficult type to fight against. In this paper, we propose 8 a simple and efficient method to detect and defend against TCP SYN flooding attacks under 9 different IP spoofing types, including subnet spoofing. The method makes use of a storage-10 efficient data structure and a change-point detection method to distinguish complete three-way 11 TCP handshakes from incomplete ones. This lightweight approach makes it relatively easy 12 to deploy the scheme as its resource requirement is reasonably low. Simulation experiments 13 consistently show that our method is both efficient and effective in defending against TCP-based 14 flooding attacks under different IP spoofing types. Specifically, our method outperforms others 15 in achieving a higher detection rate yet with lower storage and computation costs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Analysis of SYN Flooding Attacks on TCP Connections

SYN flooding attacks are very common types of attacks in IP (Internet Protocol) based networks. It is a type of Denial of Service Attack in which attacker sends many SYN request with spoofed source address to a victim’s machine. Each request causes the targeted host to allocate data structures out of a limited pool of resources. After some time the targeted host goes out of resources and cannot...

متن کامل

Review of syn-flooding attack detection mechanism

Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable re...

متن کامل

Syn-flooding Attack Detection Mechanism

Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable re...

متن کامل

Towards a High-speed Router-based Anomaly/Intrusion Detection System

Traffic anomalies and attacks are commonplace in today’s networks, and identifying them rapidly and accurately is critical for large networks. With the rapid growth of network bandwidth and fast emergence of new attacks/worms, existing network intrusion detection systems (IDS) are insufficient for the following two reasons. First, they are mostly host-based or located on low-end routers, and no...

متن کامل

Analysis of a Denial of Service Attack on TCP

This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source addresses to a victim’s machine. Each request causes the targeted host to instantiate data structures out of a limited pool of resources. Once ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Telecommunication Systems

دوره 33  شماره 

صفحات  -

تاریخ انتشار 2006