A collaborative defense mechanism against SYN flooding attacks in IP networks

被引:7
|
作者
Safa, Haidar [1 ]
Chouman, Mohamad [1 ]
Artail, Hassan [2 ]
Karam, Marcel [1 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
Denial-of-Service; IP spoofing; SYN flooding; Network security;
D O I
10.1016/j.jnca.2007.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:509 / 534
页数:26
相关论文
共 50 条
  • [11] A collaborative defense mechanism against DDoS attacks for network service continuity
    Park, PyungKoo
    Yoo, Seongmin
    Ryu, Hoyong
    Park, Jaehyung
    Chung, Kyung-Ho
    Ryou, Jaecheol
    ASIA LIFE SCIENCES, 2015, : 93 - 107
  • [12] An Early Stage Detecting Method against SYN Flooding Attacks
    Sun Qibo
    中国通信, 2009, 6 (04) : 108 - 115
  • [13] An Early Stage Detecting Method against SYN Flooding Attacks
    Sun Qibo
    Wang Shangguang
    Yan Danfeng
    Yang Fangchun
    CHINA COMMUNICATIONS, 2009, 6 (04) : 108 - 115
  • [14] Detecting SYN flooding attacks
    Wang, HI
    Zhang, DL
    Shin, KG
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
  • [15] A Nonparametric Adaptive CUSUM Method and Its Application in Source-End Defense against SYN Flooding Attacks
    YU Ming School of Information and Communication Engineering
    WuhanUniversityJournalofNaturalSciences, 2011, 16 (05) : 414 - 418
  • [16] Period-based defense mechanism against malicious data packet flooding attacks in wireless ad hoc networks
    Kim, Hyojin
    Song, JooSeok
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [17] Software defined network moving target defense mechanism against link flooding attacks
    Xie L.
    Ding Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (01): : 36 - 43
  • [18] An Energy-Efficient Defense against Message Flooding Attacks in Delay Tolerant Networks
    Asahina, Hiromu
    Arai, Keisuke
    Haruta, Shuichiro
    Mathiopoulos, P. Takis
    Sasase, Iwao
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2021, E104B (04) : 348 - 359
  • [19] Collaborative defense mechanism using statistical detection method against DDoS attacks
    Song, ByungHak
    Heo, Joon
    Hong, Choong Seon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (10) : 2655 - 2664
  • [20] Strengthening and Securing the TCP/IP Stack against SYN Attacks
    Mohamed, A. Baes
    Kandil, A.
    PROCEEDINGS OF THE ITI 2009 31ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2009, : 627 - 632