A performance analysis of network under SYN-flooding attack

This paper focus on the Denial of Service (DoS) attack based on the SYN flooding in real exiting This approach gives a comprehensive base to analyzed the performance of the network under this attack It can also indentify victim and attacker nodes after carryout performance analysis of network traffic in the network. Under this attack the memory and CPU performance of victim node got badly affected and other nodes in the network could not get any chance to connect with this attacked (victim) node.

[1]  Zhang Jie Method of defending SYN Flooding attack by receiving two same source SYN packets , 2008 .

[2]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[3]  Timothy A. Gonsalves,et al.  Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique , 2010, 2010 National Conference On Communications (NCC).

[4]  Lee Garber,et al.  Denial-of-Service Attacks Rip the Internet , 2000, Computer.

[5]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.

[6]  Douglas E. Comer,et al.  Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .

[7]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[8]  William Stallings,et al.  Data and Computer Communications , 1985 .

[9]  M FioreAnthony The Machinery Industry , 2013 .

[10]  William Stallings Data and Computer "Communications, 7th ed , 2004 .

[11]  Van Jacobson,et al.  TCP Extensions for High Performance , 1992, RFC.

[12]  Z. Sun,et al.  Traffic predictability based on ARIMA/GARCH model , 2006, 2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06..

[13]  San-qi Li,et al.  A predictability analysis of network traffic , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[14]  W. Richard Stevens,et al.  TCP/IP Illustrated, Volume 1: The Protocols , 1994 .

[15]  Timothy A. Gonsalves,et al.  Detection of Syn Flooding Attacks using Linear Prediction Analysis , 2006, 2006 14th IEEE International Conference on Networks.