CFP last date
20 January 2025
Reseach Article

Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks

by S.Gavaskar, R.Surendiran, Dr.E.Ramaraj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 6
Year of Publication: 2010
Authors: S.Gavaskar, R.Surendiran, Dr.E.Ramaraj
10.5120/1083-1399

S.Gavaskar, R.Surendiran, Dr.E.Ramaraj . Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks. International Journal of Computer Applications. 6, 6 ( September 2010), 12-15. DOI=10.5120/1083-1399

@article{ 10.5120/1083-1399,
author = { S.Gavaskar, R.Surendiran, Dr.E.Ramaraj },
title = { Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 6 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number6/1083-1399/ },
doi = { 10.5120/1083-1399 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:42.445844+05:30
%A S.Gavaskar
%A R.Surendiran
%A Dr.E.Ramaraj
%T Article:Three Counter Defense Mechanism for TCP SYN Flooding Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 6
%P 12-15
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays network growing rampant manner and uses as transfer medium like data, money transaction, information etc. Even though internet plays a vital role still there is some vulnerability. Ex: virus, spam, hacking, DOS, DDos, etc. We are focusing Distributed Denial of Service; there is plenty of Denial of Service mechanism existed in that we took SYN Flood attacks.

References
  1. Minho Sung and Jun Xu (2003), “IP Traceback-based Intelligent Packet filtering: ANovel Technique for Defending against Internet DDoS attacks”, IEEE Transactions on parallel and Distributed Systems , vol.14.No.9.September .
  2. Shigang Chen, Member,IEEE, and Qingguo Song ,(2005), Perimeter–Based Defense against Bandwith DDoS Attacks, IEEE Transactions on Parallel and Distributed systems, Vol.16,No.6, Digital Object Identifier: 10.1109/TPDS.2005.74.
  3. Guangsen zhang , Manish Parashar, (2006), Department of Electrical and Computer Engineering,RUTGERS,The State University of New Jersey, Cooperative defence against DDoS attacks,Journal of research and Practice in Information Technology, ol.38,No.1.
  4. Rocky C.Chang,(2002),”Defending against Flooding-Based Distributed Denial-of-service Attacks:A Tutorial”,IEEECommunications Magazine,October.
  5. H. Wang, D. Zhang, and K. G. Shin, “Detecting SYN flooding attacks,” in IEEE INFOCOM, 2002.
  6. M. V. Ramakrishna, E. Fu, and E. Bahcekapili, “Efficient hardware hashing functions for high performance computers,” IEEE Transactionson computers, vol.46,no.12,pp.1378-1381,1997. 1997.
Index Terms

Computer Science
Information Sciences

Keywords

DDos TCP SYN SYN flood