An efficient detection of TCP Syn flood attacks with spoofed IP addresses
- Authors
- Bae, Youngjun; Kim, Intae; Hwang, Seong Oun
- Issue Date
- 2018
- Publisher
- IOS PRESS
- Keywords
- SYN flood attack; DDoS attack; bloom filter
- Citation
- JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp.5983 - 5991
- Journal Title
- JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Volume
- 35
- Number
- 6
- Start Page
- 5983
- End Page
- 5991
- URI
- https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/4747
- DOI
- 10.3233/JIFS-169839
- ISSN
- 1064-1246
- Abstract
- TCP SYN flood attack has been one of representative DDoS attack in computer security history. To cope with this, a number of researches have been done, but they have a high false detection rate and are hard to be applicable in network address translation environment which is very common in the real world. To address these problems, we propose an efficient scheme to cope with SYN flood attacks with spoofed IP addresses. Compared to the existing approaches, it achieves the lowest false positive rate of 0.0003% at maximum and detects false IP packets at an earlier point of time, which serve to reduce the impacts of DDoS attacks significantly.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.