ARD: A robust prevention technique for SYN flood attack

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 548

فایل این مقاله در 15 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

EECIT01_048

تاریخ نمایه سازی: 5 اردیبهشت 1396

چکیده مقاله:

SYN flood is a well-known DoS attack which uses TCP three way handshake’s weakness toconsume victim’s resources and makes it out of service for legitimate users. Most of proposedsolutions are just detection approaches. Even those claim that are prevention approaches areactually just defense approaches and act after attack’s occurrence. SYN cookie is one of thosewho claim as a prevention method. But due to SYN cookie drawbacks even in SYN cookiepresence an attacker can mount attack yet. This paper proposes an improved SYN cookietechnique called Automatic Reverse DoS (ARD) which is a real prevention solution. TheARD faces attacker botnets to DoS attack themselves and in fact disarms attacker, so attackercan’t mount attack. The proposed idea simulated by OPNET and different parameters ofvictim server is surveyed. The simulation results prove ARD accuracy and its power inprevention of server against SYN flood attack.

کلیدواژه ها:

Network Security ، SYN flood attack ، SYN flood prevention ، DoS prevention ، DoS ، DDoS ، Automatic Reverse DoS INTRODUCTION

نویسندگان

Mohsen Moghanian

Department of Information Technology, Electronic Branch, Islamic Azad University Tehran, Iran

Arash Habibi lashkari

Department of Information Technology, Electronic Branch, Islamic Azad University Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Bhirud and Katkar. (2011). SYN flood attack prevention using main-memory ...
  • Chen. (2000). Study On the prevention of SYN flooding by ...
  • Divakaran, Murthy and Gonsalves. (2006). Detection of Syn Flooding Attacks ...
  • Eddy. (2006). Defenses against TCP SYN Flooding Attacks. The Internet ...
  • Fu and Lai. (2010). An improved algorithm for detecting SYN ...
  • Geetha and Sreenath. (2014). SYN flooding attack - Identification and ...
  • Haris _ Ahmad and Ghani. (2010). Detecting TCP SYN Flood ...
  • Lemon. (2002). Resisting SYN flood DoS attacks with a SYN ...
  • Mirzaie , Elyato and Sarram. (2010). Preventing of SYN Flood ...
  • Narita , Katoh , Bista and Takata. (2011). Evaluation of ...
  • Nashat , Jiang and Horiguchi. (2008). Detecting SYN Flooding Agents ...
  • Nissanke and Sun. (2008). A model for analysis of SYN ...
  • Ricciulli, Lincoln, and Kakkar. (2000). TCP SYN Flooding Defense. Published ...
  • Rui _ Wen-Li and Wen-Ling. (2009). SYN Flooding Detecting Using ...
  • Sahu and Chaudhari. (2012). A Performance Analysis of Network under ...
  • Shin , Kim and Jang. (2000). D-SAT: detecting SYN flooding ...
  • Sun , Fan and Liu. (2007). A Robust Scheme to ...
  • Sun , Hu , Zhou , Xiao and Liu. (2009). ...
  • Wang _ Zhang and Shin. (2002). Detecting SYN flooding attacks. ...
  • Wei , Gu and Ling. (2008). An Early Stage Detecting ...
  • نمایش کامل مراجع