A collaborative defense mechanism against SYN flooding attacks in IP networks

被引:7
|
作者
Safa, Haidar [1 ]
Chouman, Mohamad [1 ]
Artail, Hassan [2 ]
Karam, Marcel [1 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
Denial-of-Service; IP spoofing; SYN flooding; Network security;
D O I
10.1016/j.jnca.2007.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses to a victim's host. This keeps that host from handling legitimate requests, causing it to populate its backlog queue with forged TCP connections. In this article, we propose a novel defense mechanism that makes use of the edge routers that are associated with the spoofed IP addresses' networks to determine whether the incoming SYN-ACK segment is valid. This is accomplished by maintaining a matching table of the outgoing SYNs and incoming SYN-ACKs and also by using the ARP protocol. If an incoming SYN-ACK segment is not valid, the edge router resets the connection at the victim's host, freeing up an entry in the victim's backlog queue, and enabling it to accept other legitimate incoming connection requests. We also present a communication protocol to encourage collaboration between various networks to protect each other. We evaluated the performance of our proposed approach and studied its impact on the network. Our experimental and simulation results showed the efficiency of our proposed collaborative defense mechanism. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:509 / 534
页数:26
相关论文
共 50 条
  • [21] Defense mechanism using overlay against DDoS attacks on converged networks
    Kim, Mihui
    Doh, Inshil
    Chae, Kijoon
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1539 - +
  • [22] Adaptive detection of SYN flooding attacks at source-end networks
    School of Communication Engineering, Xidian University, Xi'an 710071, China
    不详
    Chin J Electron, 2008, 1 (141-144):
  • [23] Adaptive detection of SYN flooding attacks at source-end networks
    Yu, Ming
    Chen Weidong
    Zhou Xiyuan
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 141 - 144
  • [24] Annulling SYN Flooding Attacks with WhiteList
    Kim, Tae-Hyung
    Choi, Young-Sik
    Kim, Jong
    Hong, Sung Je
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 371 - +
  • [25] Source Detection of SYN Flooding Attacks
    Bellaiche, Martine
    Gregoire, Jean-Charles
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 40 - +
  • [26] Fellowship: Defense against Flooding and Packet Drop Attacks in MANET
    Balakrishnan, Venkatesan
    Varadharajan, Vijay
    Tupakula, Udaya Kiran
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 1027 - 1030
  • [27] Deployable overlay network for defense against distributed SYN flood attacks
    Ohsita, Yuichi
    Ata, Shingo
    Murata, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (08) : 2618 - 2630
  • [28] Deployable overlay network for defense against distributed SYN flood attacks
    Ohsita, Y
    Ata, S
    Murata, M
    ICCCN 2005: 14TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2005, : 407 - 412
  • [29] A flow based detection mechanism against flooding attacks in mobile ad hoc networks
    Guo, Yinghua
    Gordon, Steven
    Perreau, Sylvie
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3107 - +
  • [30] A Responsive Defense Mechanism Against DDoS Attacks
    Mosharraf, Negar
    Jayasumana, Anura P.
    Ray, Indrakshi
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 347 - 355