51
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A convenient way to mitigate DDoS TCP SYN flood attack

, &

References

  • Eddy, Wesley M. “Defenses against TCP SYN flooding attacks.” The Internet Protocol Journal 9.4 (2006): 2-16
  • Liu, Pi-E., and Zhong-Hua Sheng. “Defending Against TCP SYN Flooding with a new kind of SYN-Agent.” 2008 International Conference on Machine Learning and Cybernetics. Vol. 2. IEEE, 2008.
  • Eddy, Wesley. TCP SYN flooding attacks and common mitigations. No. rfc4987. 2007.
  • Ubale, Tushar, and Ankit Kumar Jain. “SRL: An TCP SYNFLOOD DDoS mitigation approach in software-defined networks.” 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018.
  • Lemon, Jonathan. “Resisting {SYN} Flood {DoS} Attacks with a {SYN} Cache.” BSDCon 2002 (BSDCon 2002). 2002.
  • Rahouti, Mohamed, et al. “SYNGuard: Dynamic threshold based SYN flood attack detection and mitigation in software defined networks.” IET Networks 10.2 (2021): 76-87. doi: 10.1049/ntw2.12009
  • Khalaf, Bashar Ahmed, et al. “Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods.” IEEE Access 7 (2019): 51691-51713. doi: 10.1109/ACCESS.2019.2908998
  • Soliman, Ahmed K., Cherif Salama, and Hoda K. Mohamed. “Detecting DNS reflection amplification DDoS attack originating from the cloud.” 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018.
  • Virupakshar, Karan B., et al. “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud.” Procedia Computer Science 167 (2020): 2297-2307. doi: 10.1016/j.procs.2020.03.282
  • Gupta, Alka, and Lalit Sen Sharma. “Detecting attacks in high-speed networks: Issues and Solutions.” Information Security Journal: A Global Perspective 29.2 (2020): 51-61.
  • Dahiya, Amrita, and B. B. Gupta. “A PBNM and economic incentive-based defensive mechanism against DDoS attacks.” Enterprise Information Systems 16.3 (2022): 406-426. doi: 10.1080/17517575.2019.1700553
  • Kaur Chahal, Jasmeen, Abhinav Bhandari, and Sunny Behal. “Distributed denial of service attacks: a threat or challenge.” New Review of Information Networking 24.1 (2019): 31-103. doi: 10.1080/13614576.2019.1611468
  • Baishya, Ram Charan, and D. K. Bhattacharyya. “A complete detection and mitigation framework to protect a network from DDoS attacks.” IETE Journal of Research 68.1 (2022): 315-332 doi: 10.1080/03772063.2019.1604173
  • Singhal, Sunita, et al. “Detection of application layer DDoS attacks using big data technologies.” Journal of Discrete Mathematical Sciences and Cryptography 23.2 (2020): 563-571. doi: 10.1080/09720529.2020.1729505
  • Fadhil, Saif Aamer. “Internet of Things security threats and key technologies.” Journal of Discrete Mathematical Sciences and Cryptography 24.7 (2021): 1951-1957. doi: 10.1080/09720529.2021.1957189
  • Mishra, Narendra, and R. K. Singh. “Prioritisation and security defense algorithm for cloud specific vulnerability through scoring and base metric group.” Journal of Interdisciplinary Mathematics 23.2 (2020): 481-491. doi: 10.1080/09720502.2020.1731961

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.