Defense against SYN flooding attacks: A particle swarm optimization approach
SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the v...
Gespeichert in:
Veröffentlicht in: | Computers & electrical engineering 2014-08, Vol.40 (6), p.2013-2025 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2025 |
---|---|
container_issue | 6 |
container_start_page | 2013 |
container_title | Computers & electrical engineering |
container_volume | 40 |
creator | Jamali, Shahram Shaker, Vahid |
description | SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space. |
doi_str_mv | 10.1016/j.compeleceng.2014.05.012 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1629346924</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0045790614001591</els_id><sourcerecordid>1629346924</sourcerecordid><originalsourceid>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</originalsourceid><addsrcrecordid>eNqNkD9PwzAUxC0EEqXwHczGkmDHjR2zVeWvVMEADEyW4zwXlyQOtguCT0-qMjAynZ50d0_3Q-iUkpwSys_XufHdAC0Y6Fd5QegsJ2VOaLGHJrQSMiOiLPfRhJBZmQlJ-CE6inFNxpvTaoKWl2Chj4D1Srs-Jvz4co9t633j-hXWKWnzFi_wHA86JGdawPFThw77IbnOfevkfI_1MASvzesxOrC6jXDyq1P0fH31tLjNlg83d4v5MjOsEiljjaFMsEoyUttCClnWtdWWFYRIBryBShCQNa-oMbKoaiMpA8tYzahoSsrZFJ3tese37xuISXUuGmhb3YPfREV5IdmMy2I2WuXOaoKPMYBVQ3CdDl-KErUlqNbqD0G1JahIqUaCY3axy8K45cNBUNE46A00LoBJqvHuHy0_ds9_4A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1629346924</pqid></control><display><type>article</type><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><source>Elsevier ScienceDirect Journals</source><creator>Jamali, Shahram ; Shaker, Vahid</creator><creatorcontrib>Jamali, Shahram ; Shaker, Vahid</creatorcontrib><description>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</description><identifier>ISSN: 0045-7906</identifier><identifier>EISSN: 1879-0755</identifier><identifier>DOI: 10.1016/j.compeleceng.2014.05.012</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Blocking ; Buffers ; Computer simulation ; Flooding ; Joints ; Optimization ; Swarm intelligence ; TCP (protocol)</subject><ispartof>Computers & electrical engineering, 2014-08, Vol.40 (6), p.2013-2025</ispartof><rights>2014 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</citedby><cites>FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0045790614001591$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Jamali, Shahram</creatorcontrib><creatorcontrib>Shaker, Vahid</creatorcontrib><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><title>Computers & electrical engineering</title><description>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</description><subject>Blocking</subject><subject>Buffers</subject><subject>Computer simulation</subject><subject>Flooding</subject><subject>Joints</subject><subject>Optimization</subject><subject>Swarm intelligence</subject><subject>TCP (protocol)</subject><issn>0045-7906</issn><issn>1879-0755</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNqNkD9PwzAUxC0EEqXwHczGkmDHjR2zVeWvVMEADEyW4zwXlyQOtguCT0-qMjAynZ50d0_3Q-iUkpwSys_XufHdAC0Y6Fd5QegsJ2VOaLGHJrQSMiOiLPfRhJBZmQlJ-CE6inFNxpvTaoKWl2Chj4D1Srs-Jvz4co9t633j-hXWKWnzFi_wHA86JGdawPFThw77IbnOfevkfI_1MASvzesxOrC6jXDyq1P0fH31tLjNlg83d4v5MjOsEiljjaFMsEoyUttCClnWtdWWFYRIBryBShCQNa-oMbKoaiMpA8tYzahoSsrZFJ3tese37xuISXUuGmhb3YPfREV5IdmMy2I2WuXOaoKPMYBVQ3CdDl-KErUlqNbqD0G1JahIqUaCY3axy8K45cNBUNE46A00LoBJqvHuHy0_ds9_4A</recordid><startdate>20140801</startdate><enddate>20140801</enddate><creator>Jamali, Shahram</creator><creator>Shaker, Vahid</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140801</creationdate><title>Defense against SYN flooding attacks: A particle swarm optimization approach</title><author>Jamali, Shahram ; Shaker, Vahid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c387t-3dc13738930bf29795bbfaf320093e6de870e9b681cc928bc913ef33b317d5163</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Blocking</topic><topic>Buffers</topic><topic>Computer simulation</topic><topic>Flooding</topic><topic>Joints</topic><topic>Optimization</topic><topic>Swarm intelligence</topic><topic>TCP (protocol)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jamali, Shahram</creatorcontrib><creatorcontrib>Shaker, Vahid</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & electrical engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jamali, Shahram</au><au>Shaker, Vahid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defense against SYN flooding attacks: A particle swarm optimization approach</atitle><jtitle>Computers & electrical engineering</jtitle><date>2014-08-01</date><risdate>2014</risdate><volume>40</volume><issue>6</issue><spage>2013</spage><epage>2025</epage><pages>2013-2025</pages><issn>0045-7906</issn><eissn>1879-0755</eissn><abstract>SYN flooding attack is a threat that has been designed based on vulnerabilities of the connection establishment phase of the TCP protocol. In this attack some sources send a large number of TCP SYN segments, without completing the third handshake step to quickly exhaust connection resources of the victim server. Hence, a main part of the server’s buffer space is allocated to the attack half open connections and incoming new connection requests will be blocked. This paper proposes a novel framework, in which, the defense issue is formulated as an optimization problem. Then it employs the particle swarm optimization (PSO) algorithm to solve this optimization problem. Our theoretical analysis and packet-level simulations in ns-2 environment show that the proposed defense strategy called PSO_SYN decreases the number of blocked TCP connection requests and cuts down share of attack connections from the buffer space.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.compeleceng.2014.05.012</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0045-7906 |
ispartof | Computers & electrical engineering, 2014-08, Vol.40 (6), p.2013-2025 |
issn | 0045-7906 1879-0755 |
language | eng |
recordid | cdi_proquest_miscellaneous_1629346924 |
source | Elsevier ScienceDirect Journals |
subjects | Blocking Buffers Computer simulation Flooding Joints Optimization Swarm intelligence TCP (protocol) |
title | Defense against SYN flooding attacks: A particle swarm optimization approach |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T03%3A36%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defense%20against%20SYN%20flooding%20attacks:%20A%20particle%20swarm%20optimization%20approach&rft.jtitle=Computers%20&%20electrical%20engineering&rft.au=Jamali,%20Shahram&rft.date=2014-08-01&rft.volume=40&rft.issue=6&rft.spage=2013&rft.epage=2025&rft.pages=2013-2025&rft.issn=0045-7906&rft.eissn=1879-0755&rft_id=info:doi/10.1016/j.compeleceng.2014.05.012&rft_dat=%3Cproquest_cross%3E1629346924%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1629346924&rft_id=info:pmid/&rft_els_id=S0045790614001591&rfr_iscdi=true |