A collaborative defense mechanism against SYN flooding attacks in IP networks

被引:7
|
作者
Safa, Haidar [1 ]
Chouman, Mohamad [1 ]
Artail, Hassan [2 ]
Karam, Marcel [1 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
Denial-of-Service; IP spoofing; SYN flooding; Network security;
D O I
10.1016/j.jnca.2007.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:509 / 534
页数:26
相关论文
共 50 条
  • [1] LOT: A Defense Against IP Spoofing and Flooding Attacks
    Gilad, Yossi
    Herzberg, Amir
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
  • [2] Defense against SYN flooding attacks: A particle swarm optimization approach
    Jamali, Shahram
    Shaker, Vahid
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 2013 - 2025
  • [3] An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently
    Xiao, Bin
    Chen, Wei
    He, Yanxiang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (04) : 456 - 470
  • [4] Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks
    Kim, Hyojin
    Chitti, Ramachandra Bhargav
    Song, JooSeok
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 579 - 582
  • [5] Source-end Defense against SYN flooding attacks: An adaptive detection method
    Yu, Ming
    Chen, Weidong
    Zhou, Xiyuan
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1674 - 1677
  • [6] Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks
    Rebahi, Yacine
    Sher, Muhammad
    Magedanz, Thomas
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 848 - 851
  • [7] PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm
    Jamali, Shahram
    Shaker, Gholam
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) : 214 - 221
  • [8] An Effective Defense Against SYN Flooding Attack in SDN
    Kim, DongHyuk
    Dinh, Phuc Trinh
    Noh, Sichul
    Yi, Junmin
    Park, Minho
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 369 - 371
  • [9] CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks
    Lee, Soo Bum
    Kang, Min Suk
    Gligor, Virgil D.
    PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), 2013, : 417 - 427
  • [10] Novel Defense Mechanism against Data Flooding Attacks in Ad Hoc Network
    Bahaddur, Indira
    Triveni, C. L.
    Srikanth, P. C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,