Abstract
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in the early stages due to their reliance on passively sniffing an attacking signature. The method presented in this paper captures attacking signatures using an active probing scheme that ensures the efficient early detection. The active probing scheme-DARB obtains the delay of routers by sending packets containing special Time-to-Live set at the IP headers. The results of the probe are used to perform SYN flooding detection, which is reliable and with little overhead. This approach is more independent than other methods that require cooperation from network devices. Experiments show that this delay-probing approach distinguishes half-open connections caused by SYN flooding attacks from those arising from other causes accurately and at an early stage.
Original language | English |
---|---|
Title of host publication | Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005 |
Pages | 709-715 |
Number of pages | 7 |
Volume | 1 |
DOIs | |
Publication status | Published - 1 Sept 2005 |
Event | 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005 - Fukuoka, Japan Duration: 20 Jul 2005 → 22 Jul 2005 |
Conference
Conference | 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005 |
---|---|
Country/Territory | Japan |
City | Fukuoka |
Period | 20/07/05 → 22/07/05 |
ASJC Scopus subject areas
- Hardware and Architecture