Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoof...
| Published in: | Journal of Engineering |
|---|---|
| Main Authors: | Hamid M. Ali, Ibraheem K. Ibraheem, Sarah W.A. Ahmad |
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad
2023-05-01
|
| Subjects: | |
| Online Access: | https://joe.uobaghdad.edu.iq/index.php/main/article/view/2119 |
Similar Items
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
by: Zakwan AlArnaout, et al.
Published: (2022-12-01)
by: Zakwan AlArnaout, et al.
Published: (2022-12-01)
TRAP: A Three-Way Handshake Server for TCP Connection Establishment
by: Fu-Hau Hsu, et al.
Published: (2016-11-01)
by: Fu-Hau Hsu, et al.
Published: (2016-11-01)
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
by: Basheer Riskhan, et al.
Published: (2023-07-01)
by: Basheer Riskhan, et al.
Published: (2023-07-01)
HADEC: Hadoop-based live DDoS detection framework
by: Sufian Hameed, et al.
Published: (2018-07-01)
by: Sufian Hameed, et al.
Published: (2018-07-01)
Optimal path identification to defend against DDoS attacks
by: JIN Guang1, et al.
Published: (2008-01-01)
by: JIN Guang1, et al.
Published: (2008-01-01)
Optimal path identification to defend against DDoS attacks
by: JIN Guang1, et al.
Published: (2008-01-01)
by: JIN Guang1, et al.
Published: (2008-01-01)
DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy
by: Mohammad Najafimehr, et al.
Published: (2023-12-01)
by: Mohammad Najafimehr, et al.
Published: (2023-12-01)
A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning
by: Jesus Arturo Perez-Diaz, et al.
Published: (2020-01-01)
by: Jesus Arturo Perez-Diaz, et al.
Published: (2020-01-01)
DDoS defense with IP traceback and path identification
by: JIN Guang, et al.
Published: (2011-01-01)
by: JIN Guang, et al.
Published: (2011-01-01)
DDoS defense with IP traceback and path identification
by: JIN Guang, et al.
Published: (2011-01-01)
by: JIN Guang, et al.
Published: (2011-01-01)
DDoS Flood and Destination Service Changing Sensor
by: Fu-Hau Hsu, et al.
Published: (2021-03-01)
by: Fu-Hau Hsu, et al.
Published: (2021-03-01)
Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications
by: Nivedita Mishra, et al.
Published: (2021-12-01)
by: Nivedita Mishra, et al.
Published: (2021-12-01)
Study of a new packet marking scheme for DDoS attack source traceback
by: LI Jin-ming, et al.
Published: (2005-01-01)
by: LI Jin-ming, et al.
Published: (2005-01-01)
Study of a new packet marking scheme for DDoS attack source traceback
by: LI Jin-ming, et al.
Published: (2005-01-01)
by: LI Jin-ming, et al.
Published: (2005-01-01)
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
by: Abdinasir Hirsi, et al.
Published: (2025-01-01)
by: Abdinasir Hirsi, et al.
Published: (2025-01-01)
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
by: Sheeraz Ahmed, et al.
Published: (2023-02-01)
by: Sheeraz Ahmed, et al.
Published: (2023-02-01)
Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning
by: Abimbola O. Sangodoyin, et al.
Published: (2021-01-01)
by: Abimbola O. Sangodoyin, et al.
Published: (2021-01-01)
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
by: YAN Fen1~3, et al.
Published: (2008-01-01)
by: YAN Fen1~3, et al.
Published: (2008-01-01)
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
by: YAN Fen1~3, et al.
Published: (2008-01-01)
by: YAN Fen1~3, et al.
Published: (2008-01-01)
LOGICAL TIME AND SPACE OF THE NETWORK INTRUSION
by: Daniel MIHÁLYI, et al.
Published: (2017-12-01)
by: Daniel MIHÁLYI, et al.
Published: (2017-12-01)
Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity
by: Md. Alamgir Hossain, et al.
Published: (2024-04-01)
by: Md. Alamgir Hossain, et al.
Published: (2024-04-01)
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey
by: Zawar Shah, et al.
Published: (2022-01-01)
by: Zawar Shah, et al.
Published: (2022-01-01)
Visualization analysis and design of DDoS attack
by: Yi-fan ZHANG, et al.
Published: (2017-02-01)
by: Yi-fan ZHANG, et al.
Published: (2017-02-01)
EfficientSTNet: A Deep Learning Approach for Multi-Class DDoS Detection
by: Lei Zhang, et al.
Published: (2025-01-01)
by: Lei Zhang, et al.
Published: (2025-01-01)
SYN flood attack defense strategy for asymmetric routing
by: Jian-xi TAO, et al.
Published: (2013-08-01)
by: Jian-xi TAO, et al.
Published: (2013-08-01)
SYN flood attack defense strategy for asymmetric routing
by: Jian-xi TAO, et al.
Published: (2013-08-01)
by: Jian-xi TAO, et al.
Published: (2013-08-01)
DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks
by: Shi Dong, et al.
Published: (2020-01-01)
by: Shi Dong, et al.
Published: (2020-01-01)
Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks
by: Khundrakpam Johnson Singh, et al.
Published: (2016-10-01)
by: Khundrakpam Johnson Singh, et al.
Published: (2016-10-01)
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
by: Zhiqiang Luo, et al.
Published: (2015-10-01)
by: Zhiqiang Luo, et al.
Published: (2015-10-01)
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
by: Zhiqiang Luo, et al.
Published: (2015-10-01)
by: Zhiqiang Luo, et al.
Published: (2015-10-01)
Clustering based semi-supervised machine learning for DDoS attack classification
by: Muhammad Aamir, et al.
Published: (2021-05-01)
by: Muhammad Aamir, et al.
Published: (2021-05-01)
Detecting Different Types of Distributed Denial of Service Attacks
by: Esra SÖĞÜT, et al.
Published: (2021-03-01)
by: Esra SÖĞÜT, et al.
Published: (2021-03-01)
DDOS-attacks detection using an efficient measurement-based statistical mechanism
by: Benamar Bouyeddou, et al.
Published: (2020-08-01)
by: Benamar Bouyeddou, et al.
Published: (2020-08-01)
Model of coorperation defense DDoS attack based on client reputation
by: TIAN Jun-feng, et al.
Published: (2009-01-01)
by: TIAN Jun-feng, et al.
Published: (2009-01-01)
Research on tracking DDoS based on NTP reflection amplification attack
by: Kai-da JIANG, et al.
Published: (2014-10-01)
by: Kai-da JIANG, et al.
Published: (2014-10-01)
Model of coorperation defense DDoS attack based on client reputation
by: TIAN Jun-feng, et al.
Published: (2009-01-01)
by: TIAN Jun-feng, et al.
Published: (2009-01-01)
Research on tracking DDoS based on NTP reflection amplification attack
by: Kai-da JIANG, et al.
Published: (2014-10-01)
by: Kai-da JIANG, et al.
Published: (2014-10-01)
Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model
by: Abdussalam Ahmed Alashhab, et al.
Published: (2024-01-01)
by: Abdussalam Ahmed Alashhab, et al.
Published: (2024-01-01)
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study
by: Olufunsho I. Falowo, et al.
Published: (2024-01-01)
by: Olufunsho I. Falowo, et al.
Published: (2024-01-01)
Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks
by: Omar E. Elejla, et al.
Published: (2022-06-01)
by: Omar E. Elejla, et al.
Published: (2022-06-01)
Similar Items
-
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
by: Zakwan AlArnaout, et al.
Published: (2022-12-01) -
TRAP: A Three-Way Handshake Server for TCP Connection Establishment
by: Fu-Hau Hsu, et al.
Published: (2016-11-01) -
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
by: Basheer Riskhan, et al.
Published: (2023-07-01) -
HADEC: Hadoop-based live DDoS detection framework
by: Sufian Hameed, et al.
Published: (2018-07-01) -
Optimal path identification to defend against DDoS attacks
by: JIN Guang1, et al.
Published: (2008-01-01)
