Safa H.; Chouman M.; Artail H.; Karam M.
(LONDON24-28 OVAL RD, LONDON NW1 7DX, ENGLAND, 2008)
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate ...