A collaborative defense mechanism against SYN flooding attacks in IP networks

被引:7
|
作者
Safa, Haidar [1 ]
Chouman, Mohamad [1 ]
Artail, Hassan [2 ]
Karam, Marcel [1 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
Denial-of-Service; IP spoofing; SYN flooding; Network security;
D O I
10.1016/j.jnca.2007.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:509 / 534
页数:26
相关论文
共 50 条
  • [41] A defense method against backdoor attacks on neural networks
    Kaviani, Sara
    Shamshiri, Samaneh
    Sohn, Insoo
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
  • [42] Defense Against Sybil Attacks in Directed Social Networks
    Liu, Pengfei
    Wang, Xiaohan
    Che, Xiangqian
    Chen, Zhaoqun
    Gu, Yuantao
    2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 239 - 243
  • [43] Detection SYN flooding attacks using fuzzy logic
    Tuncer, Taner
    Tatar, Yetkin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 321 - 325
  • [44] Detecting SYN flooding attacks based on traffic prediction
    Wang, Shangguang
    Sun, Qibo
    Zou, Hua
    Yang, Fangchun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (10) : 1131 - 1140
  • [45] PERFORMANCE EVALUATION FOR LINUX UNDER SYN FLOODING ATTACKS
    Oshima, Shunsuke
    Nakashima, Takuo
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (03): : 555 - 565
  • [46] Centralized defense using smart routing against link-flooding Attacks
    Belabed, Dallal
    Bouet, Mathieu
    Conan, Vania
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [47] Joint application and network defense against DDoS flooding attacks in the future Internet
    Karrer, Roger P.
    Kuehn, Ulrich
    Huehn, Thomas
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 9 - +
  • [48] Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem
    Zarei, Seyed Meysam
    Fotohi, Reza
    SECURITY AND PRIVACY, 2021, 4 (03)
  • [49] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069
  • [50] Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach
    Aydeger, Abdullah
    Manshaei, Mohammad Hossein
    Rahman, Mohammad Ashiqur
    Akkaya, Kemal
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 751 - 764