Detection SYN flooding attacks using fuzzy logic

被引:9
|
作者
Tuncer, Taner [1 ]
Tatar, Yetkin [1 ]
机构
[1] Firat Univ, Dept Comp Engn, TR-23119 Elazig, Turkey
关键词
D O I
10.1109/ISA.2008.50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service attacks are one of the major type of problems in the computer network security. Because they include many other type of attacks they are one of the most frequently used attack methods.. In general, DoS attacks are used to block access to the computer networks or personal computers. SYN flooding attack is the most widespread of the DoS attacks. In these attacks normal SYN packets can not be distinguished from the SYN attack packets. In this paper, we propose a fuzzy logic based system for detecting SYN flooding attacks. Performance of the proposed system has been compared with Cumulative Sum (CUSUM) algorithm. The simulation results show that the proposed system has better performance for low and high intensity attacks than the CUSUM algorithm.
引用
收藏
页码:321 / 325
页数:5
相关论文
共 50 条
  • [1] Source Detection of SYN Flooding Attacks
    Bellaiche, Martine
    Gregoire, Jean-Charles
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 40 - +
  • [2] Detection of SYN flooding attacks using linear prediction analysis
    Divakaran, Dinil Mon
    Murthy, Hema A.
    Gonsalves, Timothy A.
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 218 - +
  • [3] Network Attacks Detection Using Fuzzy Logic
    Levonevskiy, D. K.
    Fatkieva, R. R.
    Ryzhkov, S. R.
    [J]. 2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015, : 243 - 244
  • [4] Detecting SYN flooding attacks
    Wang, HI
    Zhang, DL
    Shin, KG
    [J]. IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
  • [5] A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack
    Mkuzangwe, Nenekazi Nokuthala Penelope
    Nelwamondo, Fulufhelo Vincent
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2017), PT II, 2017, 10192 : 14 - 22
  • [6] Application of anomaly detection algorithms for detecting SYN flooding attacks
    Siris, VA
    Papagalou, F
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2050 - 2054
  • [7] Multi-Phase Detection of Spoofed SYN Flooding Attacks
    Baik, Namkyun
    Kang, Namhi
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (03): : 23 - 31
  • [8] Application of anomaly detection algorithms for detecting SYN flooding attacks
    Siris, VA
    Papagalou, F
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (09) : 1433 - 1442
  • [9] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering
    T. Raja Sree
    S. Mary Saira Bhanu
    [J]. Neural Computing and Applications, 2020, 32 : 9603 - 9619
  • [10] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering
    Sree, T. Raja
    Bhanu, S. Mary Saira
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13): : 9603 - 9619