Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks
نویسندگان
چکیده
منابع مشابه
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to be one of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be a major threat among security problems in today’s internet. These kinds of attack are extremely severe. They bring down business of company drastically. DDoS attack can easily exhaust the ...
متن کاملSyn-flooding Attack Detection Mechanism
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable re...
متن کاملEnhanced TCP SYN Attack Detection
In this paper, we analyze the stateless SYNSYN&ACK and SYN-FIN/RST detection mechanisms for TCP SYN attacks. We indicate the inherent vulnerability of the SYN-FIN/RST detection mechanism caused by the computation of the RST packet counts. We indicate why SYNSYN&ACK is a more efficient and reliable detection mechanism than SYN-FIN/RST. We come up with ‘Bot Buddies’ for TCP SYN attacks and explai...
متن کاملReview of syn-flooding attack detection mechanism
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable re...
متن کاملTCP Performance in Wireless Multi-hop Networks
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP over wireless multi-hop. The first is the conflict between TCP data packets and TCP ACKs, which causes performance to degrade for window sizes greater than 1 packet. The second is the interaction between TCP and MAC la...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information and Network Security (IJINS)
سال: 2012
ISSN: 2089-3299
DOI: 10.11591/ijins.v2i2.1768