Defending Against SYN Flood Attack under Asymmetric Routing Environment
- DOI
- 10.2991/ccis-13.2013.39How to use a DOI?
- Keywords
- SYN Flood; asymmetric routing; connection management;
- Abstract
SYN Flood attack is still one of the major distributed denial of service attacks. Any network device or computer system with connection state table may have the possibility of suffering from this attack. Moreover, under asymmetric routing environment, unidirectional traffic problem makes it more difficult to defend against SYN Flood attack. In allusion to this problem, this paper presents DARE, a novel SYN Flood defense architecture. It consists of a statistical attack detection strategy and a dual connection management strategy. We verify the feasibility and effectiveness of our method through experiments in real network environment. The results show that our proposed method can filter SYN flood traffic, and mitigate the pressure of network infrastructure.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Tao Jianxi AU - Zhou Li AU - Zhou Zhou AU - Yang Rong AU - Yang Wei AU - Liu Qingyun PY - 2013/11 DA - 2013/11 TI - Defending Against SYN Flood Attack under Asymmetric Routing Environment BT - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security PB - Atlantis Press SP - 165 EP - 168 SN - 1951-6851 UR - https://doi.org/10.2991/ccis-13.2013.39 DO - 10.2991/ccis-13.2013.39 ID - Jianxi2013/11 ER -