2012
DOI: 10.1002/sec.428
|View full text |Cite
|
Sign up to set email alerts
|

Detecting SYN flooding attacks based on traffic prediction

Abstract: SYN flooding attacks are a common type of distributed denial‐of‐service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. These schemes are effective only at the later stages when attacking signatures are obvious. In this paper, we propose a detection approach that makes use of SYN traffic prediction to determine whether SYN flooding attacks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…There is network communication in our proposed scheme, so the attacker may attack core DEX management system by SYN flooding attacks. This problem is out of our discussion in this paper, but we can develop additional security mechanism such as detection of SYN flooding .…”
Section: Discussionmentioning
confidence: 99%
“…There is network communication in our proposed scheme, so the attacker may attack core DEX management system by SYN flooding attacks. This problem is out of our discussion in this paper, but we can develop additional security mechanism such as detection of SYN flooding .…”
Section: Discussionmentioning
confidence: 99%
“…This optimization is mainly reflected in the process of sample selection. According to formula (7) to formula (10) in the manuscript, each fog node/MEC host has an optimal external weight in the network environment which is more suitable for the training.…”
Section: Numerical Simulationmentioning
confidence: 99%
“…IDS is an important security barrier that can quickly detect intrusion and security risks in the network [9,10]. The detection algorithm is one of the most important parts in IDS.…”
Section: Introductionmentioning
confidence: 99%
“…In this case, it is possible to verify the users by using ( , ) secret sharing method. Wang et al [5] deployed a private wireless sensor network to monitor the whole vehicle network. The vehicle-mounted communication mode and the position of communication event are available.…”
Section: Introductionmentioning
confidence: 99%