A novel approach for the detection of SYN Flood Attack

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-2                           
Year of Publication : 2012
Authors :SRI.Y.Madhavi Latha, Ms.G.Sindhuri, Mr.K.Sachin,Ms.K.Sravani

MLA

SRI.Y.Madhavi Latha, Ms.G.Sindhuri, Mr.K.Sachin,Ms.K.Sravani"A novel approach for the detection of SYN Flood Attack"International Journal of Computer Trends and Technology (IJCTT),V3(2):282-285 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Denial of service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN flood attacks, and the spoofed IP address keeps the position of the attacker from being traced.(edit the sentence).Therefore it is important for network administers to develop means to comprehend the latest trend of DoS attack. In this paper firstly we proposed the detection method of SYN flooding attack , secondly show the applicability of our method with prospective evaluation results and in the finally section mentioned the future scope of our method.

References-

[1] CERT Coordinate Center, “Denial of Service Attacks,”http://www.cert.org/tech tips/denial of service.html.
[2] CERT. 1996. CERT Advisory CA-1996-21: TCP SYN Flooding and IP Spoofing Attacks. Go online tohttp://www.cert.org/advisories/CA-1996-21.html.
[3] “Combating Botnets Using the Cisco ASA Botnet Traf?cFilter,” White Paper, Cisco, Jun. 2009.
[4] Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a RealInternet Trace Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo TakataIwate Prefectural University Graduate School of Software and Information Science
[5] R. R. Kompella, S. Singh, and G. Varghese, “On scalableattack detection in the network,” IEEE/ACM Transactions onNetworking, vol. 15, no. 1, pp. 14–25, Feb. 2007.
[6] H. Wang, D. Zhang, and K. G. Shin, “Change-point monitoring for the detection of DoS attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 4, pp. 193–208, October-December 2004.
[7] G. Zhang and M. Parashar, “Cooperative detection and protection against network attacks using decentralized informationsharing,” The Journal of Networks, Software Tools, and Applications, Kluwer Academic Publishers, vol. 13, no. 1, pp.67–86, 2010.
[8] J. Lemon, “Resisting SYN Flooding DOS Attacks with SYNCache,” in Proc. Conf. USENIX BSD, February 2001.
[9] M. Narita, T. Katoh, B. B. Bista, and T. Takata, “A distributeddetecting method for SYN Flood attacks and its implementation using mobile agents,” in MATES, 2009, pp. 91– 102.
[10] H. Wang, D. Zhang, and K. G. Shin, “Change-point monitoring for the detection of DoS attacks,” IEEE Transactions onDependable and Secure Computing, vol. 1, no. 4, pp. 193–208, October-December 2004.

Keywords —Dos attack,SYN flood,intruder