DDos

707 Words2 Pages

3.2 SYN Cookie Defense As touched on earlier, there is a DDoS SYN Flood attack, which involves sending a large amount of TCP SYN requests to flood the server, making it unavailable. If the server allocation is for legitimate requests, attackers will not exhaust the server. Intrusion detection regarding SYN requests is a form of defense. There is a common algorithm to use when using intrusion detection. While full time monitoring of traffic, there is no need to start sub-detection in the requests. When the detection test shows normal traffic, the possibility of attack is low because the potential of a false negative is low. On the other hand, when the traffic is abnormal the algorithm should stop and enable the secondary filter, attempting to find most attack action. Figure 6 shows a flowchart of such algorithm. Figure 6 SYN cookie technology uses the idea that while returning the TCP SYN + ACK packet, the TCP server sends a cookie value instead of a specific data area [6]. As a result, the server can check the cookie value when receiving the response. One major problem with how it works currently is that it requires high computational complexity. Few approaches have been used to reduce complexity using temporary storage of SYN packet information, but that results in the need of large data capacity. There is a new algorithm that incorporates a random key to encrypt packets of information, which increase security, speed, and safety. Furthermore, the new program adds optional IP options for validation of a trusted packet. There are many other researchers looking for more methods of SYN defense methods in order to protect TCP protocols. 3.3 Stochastic Fairness Queuing As mentioned earlier, attackers frequently use flood-ba... ... middle of paper ... ....1 (2012): 27-33. Print. [8] Kiruthika, First N.1. "A New Approach To Defend Against Ddos." Computer Science & Telecommunications31.2 (2011): 93-101. Applied Science & Technology Source. Web. 25 Feb. 2014. [9] Lonea, Alina Madalina1, Daniela Elena2, and Huaglory3, Tianfield. "Detecting Ddos Attacks In Cloud Computing Environment." International Journal Of Computers, Communications & Control 8.1 (2013): 70-78. Applied Science & Technology Source. Web. 25 Feb. 2014. [10] Sheth, Chirag, and Rajesh Thakker. "Performance Evaluation and Comparison of Network Firewalls under DDoS Attack." International Journal of Computer Network and Information Security 5.12 (2013): 60-67. Print. [11] -, Yu Ming. "Mitigating Flooding-Based DDoS Attacks by Stochastic Fairness Queueing." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4.6 (2012): 145-52. Print.

More about DDos

Open Document