dc.contributor.author |
Safa H. |
dc.contributor.author |
Chouman M. |
dc.contributor.author |
Artail H. |
dc.contributor.author |
Karam M. |
dc.contributor.editor |
|
dc.date |
2008 |
dc.date.accessioned |
2017-10-04T11:06:35Z |
dc.date.available |
2017-10-04T11:06:35Z |
dc.date.issued |
2008 |
dc.identifier |
10.1016/j.jnca.2007.12.004 |
dc.identifier.isbn |
|
dc.identifier.issn |
10848045 |
dc.identifier.uri |
http://hdl.handle.net/10938/14004 |
dc.description.abstract |
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. © 2008 Elsevier Ltd. All rights reserved. |
dc.format.extent |
|
dc.format.extent |
Pages: (509-534) |
dc.language |
English |
dc.publisher |
LONDON |
dc.relation.ispartof |
Publication Name: Journal of Network and Computer Applications; Publication Year: 2008; Volume: 31; no. 4; Pages: (509-534); |
dc.relation.ispartofseries |
|
dc.relation.uri |
|
dc.source |
Scopus |
dc.subject.other |
|
dc.title |
A collaborative defense mechanism against SYN flooding attacks in IP networks |
dc.type |
Article |
dc.contributor.affiliation |
Safa, H., Department of Computer Science, American University of Beirut, P.O. Box 11-0236, Riad El-solh, Beirut 1107 2020, Lebanon |
dc.contributor.affiliation |
Chouman, M., Department of Computer Science, American University of Beirut, P.O. Box 11-0236, Riad El-solh, Beirut 1107 2020, Lebanon |
dc.contributor.affiliation |
Artail, H., Department of Electrical and Computer Engineering, American University of Beirut, P.O. Box 11-0236, Riad El-solh, Beirut 1107 2020, Lebanon |
dc.contributor.affiliation |
Karam, M., Department of Computer Science, American University of Beirut, P.O. Box 11-0236, Riad El-solh, Beirut 1107 2020, Lebanon |
dc.contributor.authorAddress |
Safa, H.; Department of Computer Science, American University of Beirut, P.O. Box 11-0236, Riad El-solh, Beirut 1107 2020, Lebanon; email: hs33@aub.edu.lb |
dc.contributor.authorCorporate |
University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering; |
dc.contributor.authorDepartment |
Electrical and Computer Engineering |
dc.contributor.authorDivision |
|
dc.contributor.authorEmail |
hs33@aub.edu.lb; mks07@aub.edu.lb; hartail@aub.edu.lb; mk62@aub.edu.lb |
dc.contributor.faculty |
Faculty of Engineering and Architecture |
dc.contributor.authorInitials |
Safa, H |
dc.contributor.authorInitials |
Chouman, M |
dc.contributor.authorInitials |
Artail, H |
dc.contributor.authorInitials |
Karam, M |
dc.contributor.authorOrcidID |
|
dc.contributor.authorReprintAddress |
Safa, H (reprint author), Amer Univ Beirut, Dept Comp Sci, POB 11-0236, Beirut 11072020, Lebanon. |
dc.contributor.authorResearcherID |
|
dc.contributor.authorUniversity |
American University of Beirut |
dc.description.cited |
[Anonymous], 2006, NS 2 SIMULATOR; *CERT, 1998, CA199801 CERT; CHEN YW, 2000, P NETW OP MAN S 2000, P593; *CISC SYST INC, 1998, CISC SEC ADV 7XX ROU; Cisco Systems Inc., 1999, DEF STRAT PROT TCP S; Crosby S.A., 2003, P 12 USENIX SEC S, P29; Ferguson P., 2000, RFC2827; GONCALVES M, 1999, CHECK POINT FIREWALL, V1; Hu YP, 2004, PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON HEAT TRANSFER ENHANCEMENT AND ENERGY CONSERVATION, VOLS 1 AND 2, P39; Jin C., 2003, P 10 ACM C COMP COMM, P30; Kargl F., 2001, P 10 INT C WORLD WID, P514, DOI 10.1145-371920.372148; Karig D., 2001, CEL2001002 PRINC U D; KEROMYTIS AD, 2003, IEEE J SELECTED AREA; LEMON J, 2002, P USENIX BSDC 02 C F; LEVINE JR, 1992, O REILLY MEDIA; libpcap, 2011, LIBPCAP PACKET CAPTU; MACCLURE S, 1999, HACKING EXPOSED NETW; *NISCC, 2006, 012006 NISCC; NOURELDEIN NA, P TENCON 2000, P259; Ohsita Y., 2005, Proceedings. 14th International Conference on Computer Communications and Networks (IEEE Cat. No. 05EX1184), DOI 10.1109-ICCCN.2005.1523897; Paxson V, 2001, ACM SIGCOMM COMP COM, V31, P38, DOI 10.1145-505659.505664; Postel J., 1981, 792 RFC; Schuba CL, 1997, P IEEE S SECUR PRIV, P208, DOI 10.1109-SECPRI.1997.601338; Stevens R., 1994, TCP IP ILLUSTRATED, V1; TUPAKULA UK, 2004, P IEEE GLOB TEL C GL, P2240; VENEMA W, TCP WRAPPER NETWORK; WANG H, 2002, P 22 INT C DISTR COM, P421; Wangs H, 2002, P IEEE INFOCOM 2002, P1530; Zuquete A., 2002, P 6 IFIP COMM MULT S, P57; CYBER CRIME TARGETS; SUNS TCP SYN FLOODIN |
dc.description.citedCount |
7 |
dc.description.citedTotWOSCount |
2 |
dc.description.citedWOSCount |
2 |
dc.format.extentCount |
26 |
dc.identifier.articleNo |
|
dc.identifier.coden |
|
dc.identifier.pubmedID |
|
dc.identifier.scopusID |
47949098054 |
dc.identifier.url |
|
dc.publisher.address |
24-28 OVAL RD, LONDON NW1 7DX, ENGLAND |
dc.relation.ispartofConference |
|
dc.relation.ispartofConferenceCode |
|
dc.relation.ispartofConferenceDate |
|
dc.relation.ispartofConferenceHosting |
|
dc.relation.ispartofConferenceLoc |
|
dc.relation.ispartofConferenceSponsor |
|
dc.relation.ispartofConferenceTitle |
|
dc.relation.ispartofFundingAgency |
|
dc.relation.ispartOfISOAbbr |
J. Netw. Comput. Appl. |
dc.relation.ispartOfIssue |
4 |
dc.relation.ispartOfPart |
|
dc.relation.ispartofPubTitle |
Journal of Network and Computer Applications |
dc.relation.ispartofPubTitleAbbr |
J Network Comput Appl |
dc.relation.ispartOfSpecialIssue |
|
dc.relation.ispartOfSuppl |
|
dc.relation.ispartOfVolume |
31 |
dc.source.ID |
WOS:000262946600009 |
dc.type.publication |
Journal |
dc.subject.otherAuthKeyword |
Denial-of-Service |
dc.subject.otherAuthKeyword |
IP spoofing |
dc.subject.otherAuthKeyword |
Network security |
dc.subject.otherAuthKeyword |
SYN flooding |
dc.subject.otherChemCAS |
|
dc.subject.otherIndex |
Communication |
dc.subject.otherIndex |
Law enforcement |
dc.subject.otherIndex |
Laws and legislation |
dc.subject.otherIndex |
Mechanisms |
dc.subject.otherIndex |
Network protocols |
dc.subject.otherIndex |
Routers |
dc.subject.otherIndex |
Satellite links |
dc.subject.otherIndex |
Transmission control protocol |
dc.subject.otherIndex |
(e ,3e) process |
dc.subject.otherIndex |
Communication protocols |
dc.subject.otherIndex |
Edge Router (ER) |
dc.subject.otherIndex |
Elsevier (CO) |
dc.subject.otherIndex |
Flooding attacks |
dc.subject.otherIndex |
Internet protocol (IP) addresses |
dc.subject.otherIndex |
ip networks |
dc.subject.otherIndex |
simulation results |
dc.subject.otherIndex |
TCP connections |
dc.subject.otherIndex |
Three way handshake |
dc.subject.otherIndex |
Transmission control protocol (TCP) |
dc.subject.otherIndex |
Internet protocols |
dc.subject.otherKeywordPlus |
|
dc.subject.otherWOS |
Computer Science, Hardware and Architecture |
dc.subject.otherWOS |
Computer Science, Interdisciplinary Applications |
dc.subject.otherWOS |
Computer Science, Software Engineering |