2015
DOI: 10.1007/978-3-319-24315-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter

Abstract: Part 1: Networks and System ArchitectureInternational audiencePresented work focuses onto proposal, implementation and evaluation of the new method for detection and type identification of SYN flood (DoS) attacks. The method allows distinguishing type of detected SYN flood attacks – random, subnet or fixed. Based on Counting Bloom filter, the attack detection and identification algorithm is proposed, implemented and evaluated in KaTaLyzer network traffic monitoring tool. Proof of correctness of the approach fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The modified model, however, simulated the event in both time and flow more accurate. In the summer, which was dominated by rainfall-type floods and mixed floods [11], the original model was usually inaccurate in its simulation of flood peaks. Although the modified model shifted some of the simulated flood processes earlier, its performance of flood peaks was better than the original model.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The modified model, however, simulated the event in both time and flow more accurate. In the summer, which was dominated by rainfall-type floods and mixed floods [11], the original model was usually inaccurate in its simulation of flood peaks. Although the modified model shifted some of the simulated flood processes earlier, its performance of flood peaks was better than the original model.…”
Section: Resultsmentioning
confidence: 99%
“…The premise of the accurate prediction of flood events, however, is to study different types of flood processes [10]. Hence, the simulation of flood processes under high temporal resolution is becoming extremely important [11].…”
Section: Introductionmentioning
confidence: 99%
“…If the request is sent from the attacker, then no ACK will be sent back to the server, the server will keep that connection open and expect to receive messages from the user. A certain channel and resources are assigned to that user [16]. The presence of an SYN flood attack (Figure 4.2), when the attacker sends a large number of concurrent requests; without sending ACKs to the server.…”
Section: The Defense Against Syn Flood Attackmentioning
confidence: 99%
“…If a system can tolerate negligible overhead, then Bloom Filter can enhance a performance of a system. Therefore, Bloom Filter is deployed to various domains, namely, Big Data [9], Deduplication [10], [11], [12], Network Security [4], [13], Network Traffic control [14], Name Lookup [15], [16], IP address lookup [17], [18], Biometric [19], [20], Bioinformatics [21], [22], File System [23], Indexing, and many more. However, Bloom Filter is not suitable in case of correct query-answer requirements.…”
Section: Bloom Filtermentioning
confidence: 99%