The 2005 Symposium on Applications and the Internet
DOI: 10.1109/saint.2005.18
|View full text |Cite
|
Sign up to set email alerts
|

D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Network anomaly detection [5][6][7][8] has become critical to service providers in their commitment to maintain a given service level agreement.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Network anomaly detection [5][6][7][8] has become critical to service providers in their commitment to maintain a given service level agreement.…”
Section: Related Workmentioning
confidence: 99%
“…the analysis method based on packet type. In paper [7] the authors have proposed a method through monitoring the number of the SYN packets and the change of the ratio of SYN packets to other type TCP packets to determine whether anomalies have taken place. The authors of paper [8] have used the restrictions of the number of various TCP control messages to detect anomalies.…”
Section: Related Workmentioning
confidence: 99%
“…The Counting Bloom Filter is used to classify all the incoming SYN-ACK packets to the sub network into two streams, and the CUSUM algorithm is applied to make the detection decision by the two normalized differences, one of which is the difference between the number of SYN packets and the number of the first SYN-ACK packets and the other one is the difference between the number of the firs SYN-ACK packets and the number of the retransmission SYN-ACK. There are also some other related work such as SYN cookies , SYN cache, D-SAT [8] and DiDDeM [9] ,and more related work is in Refs. [10,11].…”
Section: Introductionmentioning
confidence: 99%