Defense against SYN flooding attacks: A particle swarm optimization approach

SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the v...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & electrical engineering 2014-08, Vol.40 (6), p.2013-2025
Hauptverfasser: Jamali, Shahram, Shaker, Vahid
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2025
container_issue 6
container_start_page 2013
container_title Computers & electrical engineering
container_volume 40
creator Jamali, Shahram
Shaker, Vahid
description SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.
doi_str_mv 10.1016/j.compeleceng.2014.05.012
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1629346924</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0045790614001591</els_id><sourcerecordid>1629346924</sourcerecordid><originalsourceid>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</originalsourceid><addsrcrecordid>eNqNkD9PwzAUxC0EEqXwHczGkmDHjR2zVeWvVMEADEyW4zwXlyQOtguCT0-qMjAynZ50d0_3Q-iUkpwSys_XufHdAC0Y6Fd5QegsJ2VOaLGHJrQSMiOiLPfRhJBZmQlJ-CE6inFNxpvTaoKWl2Chj4D1Srs-Jvz4co9t633j-hXWKWnzFi_wHA86JGdawPFThw77IbnOfevkfI_1MASvzesxOrC6jXDyq1P0fH31tLjNlg83d4v5MjOsEiljjaFMsEoyUttCClnWtdWWFYRIBryBShCQNa-oMbKoaiMpA8tYzahoSsrZFJ3tese37xuISXUuGmhb3YPfREV5IdmMy2I2WuXOaoKPMYBVQ3CdDl-KErUlqNbqD0G1JahIqUaCY3axy8K45cNBUNE46A00LoBJqvHuHy0_ds9_4A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1629346924</pqid></control><display><type>article</type><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><source>Elsevier ScienceDirect Journals</source><creator>Jamali, Shahram ; Shaker, Vahid</creator><creatorcontrib>Jamali, Shahram ; Shaker, Vahid</creatorcontrib><description>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</description><identifier>ISSN: 0045-7906</identifier><identifier>EISSN: 1879-0755</identifier><identifier>DOI: 10.1016/j.compeleceng.2014.05.012</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Blocking ; Buffers ; Computer simulation ; Flooding ; Joints ; Optimization ; Swarm intelligence ; TCP (protocol)</subject><ispartof>Computers &amp; electrical engineering, 2014-08, Vol.40 (6), p.2013-2025</ispartof><rights>2014 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</citedby><cites>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0045790614001591$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Jamali, Shahram</creatorcontrib><creatorcontrib>Shaker, Vahid</creatorcontrib><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><title>Computers &amp; electrical engineering</title><description>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</description><subject>Blocking</subject><subject>Buffers</subject><subject>Computer simulation</subject><subject>Flooding</subject><subject>Joints</subject><subject>Optimization</subject><subject>Swarm intelligence</subject><subject>TCP (protocol)</subject><issn>0045-7906</issn><issn>1879-0755</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNqNkD9PwzAUxC0EEqXwHczGkmDHjR2zVeWvVMEADEyW4zwXlyQOtguCT0-qMjAynZ50d0_3Q-iUkpwSys_XufHdAC0Y6Fd5QegsJ2VOaLGHJrQSMiOiLPfRhJBZmQlJ-CE6inFNxpvTaoKWl2Chj4D1Srs-Jvz4co9t633j-hXWKWnzFi_wHA86JGdawPFThw77IbnOfevkfI_1MASvzesxOrC6jXDyq1P0fH31tLjNlg83d4v5MjOsEiljjaFMsEoyUttCClnWtdWWFYRIBryBShCQNa-oMbKoaiMpA8tYzahoSsrZFJ3tese37xuISXUuGmhb3YPfREV5IdmMy2I2WuXOaoKPMYBVQ3CdDl-KErUlqNbqD0G1JahIqUaCY3axy8K45cNBUNE46A00LoBJqvHuHy0_ds9_4A</recordid><startdate>20140801</startdate><enddate>20140801</enddate><creator>Jamali, Shahram</creator><creator>Shaker, Vahid</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140801</creationdate><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><author>Jamali, Shahram ; Shaker, Vahid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Blocking</topic><topic>Buffers</topic><topic>Computer simulation</topic><topic>Flooding</topic><topic>Joints</topic><topic>Optimization</topic><topic>Swarm intelligence</topic><topic>TCP (protocol)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jamali, Shahram</creatorcontrib><creatorcontrib>Shaker, Vahid</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; electrical engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jamali, Shahram</au><au>Shaker, Vahid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defense against SYN flooding attacks: A particle swarm optimization approach</atitle><jtitle>Computers &amp; electrical engineering</jtitle><date>2014-08-01</date><risdate>2014</risdate><volume>40</volume><issue>6</issue><spage>2013</spage><epage>2025</epage><pages>2013-2025</pages><issn>0045-7906</issn><eissn>1879-0755</eissn><abstract>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.compeleceng.2014.05.012</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0045-7906
ispartof Computers & electrical engineering, 2014-08, Vol.40 (6), p.2013-2025
issn 0045-7906
1879-0755
language eng
recordid cdi_proquest_miscellaneous_1629346924
source Elsevier ScienceDirect Journals
subjects Blocking
Buffers
Computer simulation
Flooding
Joints
Optimization
Swarm intelligence
TCP (protocol)
title Defense against SYN flooding attacks: A particle swarm optimization approach
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T03%3A36%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defense%20against%20SYN%20flooding%20attacks:%20A%20particle%20swarm%20optimization%20approach&rft.jtitle=Computers%20&%20electrical%20engineering&rft.au=Jamali,%20Shahram&rft.date=2014-08-01&rft.volume=40&rft.issue=6&rft.spage=2013&rft.epage=2025&rft.pages=2013-2025&rft.issn=0045-7906&rft.eissn=1879-0755&rft_id=info:doi/10.1016/j.compeleceng.2014.05.012&rft_dat=%3Cproquest_cross%3E1629346924%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1629346924&rft_id=info:pmid/&rft_els_id=S0045790614001591&rfr_iscdi=true