2020
DOI: 10.1007/s10922-020-09540-1
|View full text |Cite
|
Sign up to set email alerts
|

ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 27 publications
0
0
0
Order By: Relevance
“…The appropriate attack target is then selected through analysis based on this knowledge, and DDoS attack methods are used. Examples include the synchronize sequence number (SYN) flooding attack [38] and internet control message protocol (ICMP) attack [39]. References [40] and [41] described wired and wireless DDoS attack methods and demonstrated the feasibility of remote DDoS attacks that can be conducted at low rates even when the attacker cannot get close to the power grid or directly access a wired network.…”
Section: A Ddos Attack Modelmentioning
confidence: 99%
“…The appropriate attack target is then selected through analysis based on this knowledge, and DDoS attack methods are used. Examples include the synchronize sequence number (SYN) flooding attack [38] and internet control message protocol (ICMP) attack [39]. References [40] and [41] described wired and wireless DDoS attack methods and demonstrated the feasibility of remote DDoS attacks that can be conducted at low rates even when the attacker cannot get close to the power grid or directly access a wired network.…”
Section: A Ddos Attack Modelmentioning
confidence: 99%