Research Article

Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks

by  S.Gavaskar, R.Surendiran, Dr.E.Ramaraj
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Issue 6
Published: September 2010
Authors: S.Gavaskar, R.Surendiran, Dr.E.Ramaraj
10.5120/1083-1399
PDF

S.Gavaskar, R.Surendiran, Dr.E.Ramaraj . Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks. International Journal of Computer Applications. 6, 6 (September 2010), 12-15. DOI=10.5120/1083-1399

                        @article{ 10.5120/1083-1399,
                        author  = { S.Gavaskar,R.Surendiran,Dr.E.Ramaraj },
                        title   = { Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 6 },
                        number  = { 6 },
                        pages   = { 12-15 },
                        doi     = { 10.5120/1083-1399 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A S.Gavaskar
                        %A R.Surendiran
                        %A Dr.E.Ramaraj
                        %T Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks%T 
                        %J International Journal of Computer Applications
                        %V 6
                        %N 6
                        %P 12-15
                        %R 10.5120/1083-1399
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays network growing rampant manner and uses as transfer medium like data, money transaction, information etc. Even though internet plays a vital role still there is some vulnerability. Ex: virus, spam, hacking, DOS, DDos, etc. We are focusing Distributed Denial of Service; there is plenty of Denial of Service mechanism existed in that we took SYN Flood attacks.

References
  • Minho Sung and Jun Xu (2003), “IP Traceback-based Intelligent Packet filtering: ANovel Technique for Defending against Internet DDoS attacks”, IEEE Transactions on parallel and Distributed Systems , vol.14.No.9.September .
  • Shigang Chen, Member,IEEE, and Qingguo Song ,(2005), Perimeter–Based Defense against Bandwith DDoS Attacks, IEEE Transactions on Parallel and Distributed systems, Vol.16,No.6, Digital Object Identifier: 10.1109/TPDS.2005.74.
  • Guangsen zhang , Manish Parashar, (2006), Department of Electrical and Computer Engineering,RUTGERS,The State University of New Jersey, Cooperative defence against DDoS attacks,Journal of research and Practice in Information Technology, ol.38,No.1.
  • Rocky C.Chang,(2002),”Defending against Flooding-Based Distributed Denial-of-service Attacks:A Tutorial”,IEEECommunications Magazine,October.
  • H. Wang, D. Zhang, and K. G. Shin, “Detecting SYN flooding attacks,” in IEEE INFOCOM, 2002.
  • M. V. Ramakrishna, E. Fu, and E. Bahcekapili, “Efficient hardware hashing functions for high performance computers,” IEEE Transactionson computers, vol.46,no.12,pp.1378-1381,1997. 1997.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

DDos TCP SYN SYN flood

Powered by PhDFocusTM