A collaborative defense mechanism against SYN flooding attacks in IP networks

被引:7
|
作者
Safa, Haidar [1 ]
Chouman, Mohamad [1 ]
Artail, Hassan [2 ]
Karam, Marcel [1 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
Denial-of-Service; IP spoofing; SYN flooding; Network security;
D O I
10.1016/j.jnca.2007.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:509 / 534
页数:26
相关论文
共 50 条
  • [31] DNS-Based Defense against IP Spoofing Attacks
    Moriyama, Eimatsu
    Takahashi, Takeshi
    Miyamoto, Daisuke
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT V, 2012, 7667 : 599 - 609
  • [32] A robust scheme to detect SYN flooding attacks
    Sun, Changhua
    Fan, Jindou
    Liu, Bin
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 175 - 179
  • [33] Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks
    Tang, Jin
    Cheng, Yu
    Hao, Yong
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 1161 - 1169
  • [34] TDFA: Traceback-based Defense against DDoS Flooding Attacks
    Foroushani, Vahid Aghaei
    Zincir-Heywood, A. Nur
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 597 - 604
  • [35] Taming IP packet flooding attacks
    Lakshminarayanan, K
    Adkins, D
    Perrig, A
    Stoica, I
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) : 45 - 50
  • [36] Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
    Bhargava, Bharat
    de Oliveira, Ruy
    Zhang, Yu
    Idika, Nwokedi C.
    ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 447 - 450
  • [37] RCS: A distributed mechanism against link flooding DDoS attacks
    Cui, Yong
    Song, Lingjian
    Xu, Ke
    INFORMATION NETWORKING: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 764 - +
  • [38] Defense against packet collusion attacks in opportunistic networks
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    Mak-Hau, Vicky
    COMPUTERS & SECURITY, 2017, 65 : 269 - 282
  • [39] Defense against Packet Dropping Attacks in Opportunistic Networks
    Ahmad, Asma'a
    Alajeely, Majeed
    Doss, Robin
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1608 - 1613
  • [40] Defense against outside attacks in wireless sensor networks
    Tripathy, Somanath
    Nandi, Sukumar
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 818 - 826