Proceedings of the 9th ACM SIGITE Conference on Information Technology Education 2008
DOI: 10.1145/1414558.1414575
|View full text |Cite
|
Sign up to set email alerts
|

A lab implementation of SYN flood attack and defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…t Y for all prediction traces are plotted in Figure 3. For all the traces tested, 3 ' t Y are mostly zeros and always much smaller than the threshold. Hence, no false alarms are reported.…”
Section: Normal Traffic Testmentioning
confidence: 94%
See 1 more Smart Citation
“…t Y for all prediction traces are plotted in Figure 3. For all the traces tested, 3 ' t Y are mostly zeros and always much smaller than the threshold. Hence, no false alarms are reported.…”
Section: Normal Traffic Testmentioning
confidence: 94%
“…The server sends the SYN-ACK to the spoofed IP addresses, and never receives the ACK packets back. Once all resources set aside for halfopen connections are reserved, new connections cannot be made, resulting in DoS [3]. Furthermore, some other system resources, such as CPU and network bandwidth used to retransmit the SYN/ACK packets, are occupied and overloaded [4].…”
Section: Introductionmentioning
confidence: 99%
“…Hands-on lab exercises on various information security topics have focus primarily on desktop environments, whether physical or virtual, and consequently can be implemented only inside isolated laboratories environments (Whitman et al 2014;Trabelsi and Alketbi 2013;Trabelsi 2011;Vigna 2003a, b;Yuan and Zhong 2008;Caltagirone et al 2006;Hill et al 2001, andTrabelsi andMustafa 2014). Recently, the computing landscape, however, is shifting.…”
Section: Introductionmentioning
confidence: 99%
“…However, there is growing interest in offensive techniques, which were originally developed by hackers [2,6,7,8,14,15,19]. Teaching ethical hacking techniques is becoming a necessary component of information security curriculum as it yields better security professionals than other curricula teaching defensive techniques alone.…”
Section: Introductionmentioning
confidence: 99%