Sciweavers

AINA
2008
IEEE

Annulling SYN Flooding Attacks with Whitelist

13 years 10 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests by filling the server’s backlog queue with malicious connection requests (SYN packets). Although several methods [1, 2, 3, 4, 5] have been proposed to solve the SYN Flooding attack, they cannot guarantee reliable connection establishments to clients under extremely aggressive SYN flooding attacks. In this paper, we propose a WhiteList-based defense scheme that increases connection success ratio of legitimate connection requests under SYN flooding attacks. We implemented this scheme as a linux kernel module. Experimental results show that the proposed method ensures high connection success ratio for legitimate clients and effectively annuls bogus SYN flooding.
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H
Added 29 May 2010
Updated 29 May 2010
Type Conference
Year 2008
Where AINA
Authors Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong
Comments (0)