Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
223 | Haining Wang, Danlu Zhang, Kang G. Shin |
SYN-dog: Sniffing SYN Flooding Sources. |
ICDCS |
2002 |
DBLP DOI BibTeX RDF |
|
185 | Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang |
LSAD: Lightweight SYN Flooding Attack Detector. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
network security, network intrusion detection system, SYN flooding |
147 | Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang |
D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
144 | Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu |
Counteract SYN flooding using second chance packet filtering. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
second chance packet filter, security, wireless LAN, DDoS, SYN flooding |
136 | Vladimir V. Shakhov, Hyunseung Choo |
On Modeling Counteraction against TCP SYN Flooding. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
TCP SYN flooding, defense mechanism, DDoS attack |
129 | BoonPing Lim, Md. Safi Uddin |
Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
non-parametric CUSUM, token bucket filtering, network security, network processor, SYN-flooding |
112 | Y. W. Chen |
Study on the prevention of SYN flooding by using traffic policing. |
NOMS |
2000 |
DBLP DOI BibTeX RDF |
|
109 | Wei Chen, Dit-Yan Yeung |
Throttling spoofed SYN flooding traffic at the source. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding |
98 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He, Edwin Hsing-Mean Sha |
An Active Detecting Method Against SYN Flooding Attack. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Ting Xue, Natalija Vlajic |
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Basheer Al-Duwairi, G. Manimaran |
Intentional dropping: a novel scheme for SYN flooding mitigation. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Wei Chen, Dit-Yan Yeung |
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
64 | V. Krishna Nandivada, Jens Palsberg |
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks. |
IEEE Real-Time and Embedded Technology and Applications Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni |
Analysis of a Denial of Service Attack on TCP. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
|
63 | Dongqing Yuan, Jiling Zhong |
A lab implementation of SYN flood attack and defense. |
SIGITE Conference |
2008 |
DBLP DOI BibTeX RDF |
security, curriculum, laboratory |
55 | Chun-Hao Yang, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, Meng-Hsun Tsai |
Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
55 | Reza Mohammadi 0003, Mauro Conti, Chhagan Lal, Satish C. Kulhari |
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. |
Int. J. Commun. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
55 | L. Kavisankar, Chenniappan Chellappan |
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack |
CoRR |
2011 |
DBLP BibTeX RDF |
|
50 | Sanjay Rawat 0001, Ashutosh Saxena |
Danger theory based SYN flood attack detection in autonomic network. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory |
47 | Zi-Yang Shen, Ming-Wei Su, Yun-Zhan Cai, Meng-Hsun Tsai |
Mitigating SYN Flooding and UDP Flooding in P4-based SDN. |
APNOMS |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Kirill Levchenko, Ramamohan Paturi, George Varghese |
On the difficulty of scalably detecting network attacks. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
communication complexity, network intrusion detection |
39 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding |
35 | Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo |
Enhancing Security by Embedding Biometric Data in IP Header. |
SOFSEM (1) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai |
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack. |
IMCOM |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad |
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Dalia Nashat, Fatma A. Hussain |
Multifractal detrended fluctuation analysis based detection for SYN flooding attack. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang 0002, Yun-Zhan Cai, Meng-Hsun Tsai |
Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane. |
APNOMS |
2020 |
DBLP DOI BibTeX RDF |
|
34 | DongHyuk Kim, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, Minho Park |
An Effective Defense Against SYN Flooding Attack in SDN. |
ICTC |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Nan Haymarn Oo, Aung Htein Maw |
Effective Detection and Mitigation of SYN Flooding Attack in SDN. |
ISCIT |
2019 |
DBLP DOI BibTeX RDF |
|
34 | T. Sasilatha, S. Balaji, P. Suresh Mohan Kumar |
An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks. |
EAI Endorsed Trans. Energy Web |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Joseph Cosmas Mushi, Mussa Kissaka, Kosmas Kapis |
ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity. |
IEA/AIE |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Reza Mohammadi 0003, Reza Javidan, Mauro Conti |
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. |
IEEE Trans. Netw. Serv. Manag. |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Nenekazi Nokuthala Penelope Mkuzangwe, Fulufhelo Vincent Nelwamondo |
A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack. |
ACIIDS (2) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Xinyu Liu, Beumjin Cho, Jong Kim 0001 |
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. |
WISA |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Lihua Miao, Wei Ding 0001, Jian Gong |
A real-time method for detecting internet-wide SYN flooding attacks. |
LANMAN |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Shahram Jamali, Vahid Shaker |
Defense against SYN flooding attacks: A particle swarm optimization approach. |
Comput. Electr. Eng. |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Shahram Jamali, Gholam Shaker |
PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. |
Comput. Math. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Saravanan Kumarasamy, A. Gowrishankar |
An Active Defense Mechanism for TCP SYN flooding attacks |
CoRR |
2012 |
DBLP BibTeX RDF |
|
34 | Tongguang Zhang |
Cumulative Sum Algorithm for Detecting SYN Flooding Attacks |
CoRR |
2012 |
DBLP BibTeX RDF |
|
34 | Mehdi Ebady Manaa, Angela Amphawan |
Review of syn-flooding attack detection mechanism |
CoRR |
2012 |
DBLP BibTeX RDF |
|
34 | Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang |
Detecting SYN flooding attacks based on traffic prediction. |
Secur. Commun. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Martine Bellaïche, Jean-Charles Grégoire |
SYN flooding attack detection by TCP handshake anomalies. |
Secur. Commun. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Rakesh Kumar Sahu, Narendra S. Chaudhari |
A performance analysis of network under SYN-flooding attack. |
WOCN |
2012 |
DBLP DOI BibTeX RDF |
|
34 | |
TCP SYN Flooding. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Maciej Korczynski, Lucjan Janowski, Andrzej Duda |
An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans. |
ICC |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Laleh Arshadi, Amir-Hossein Jahangir |
Entropy based SYN flooding detection. |
LCN |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia |
Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic. |
Int. J. Electron. Secur. Digit. Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Martine Bellaïche, Jean-Charles Grégoire |
SYN Flooding Attack Detection Based on Entropy Computing. |
GLOBECOM |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently. |
J. Parallel Distributed Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam |
A collaborative defense mechanism against SYN flooding attacks in IP networks. |
J. Netw. Comput. Appl. |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Dalia Nashat, Xiaohong Jiang 0001, Susumu Horiguchi |
Detecting SYN Flooding Agents under Any Type of IP Spoofing. |
ICEBE |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong |
Annulling SYN Flooding Attacks with Whitelist. |
AINA Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Gowri Shankar Annadurai, Saravanan Kumarasamy |
Defense Mechanism for TCP SYN Flooding Attacks using Compression Techniques. |
International Conference on Internet Computing |
2008 |
DBLP BibTeX RDF |
|
34 | Wesley M. Eddy |
TCP SYN Flooding Attacks and Common Mitigations. |
RFC |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Vasilios A. Siris, Fotini Papagalou |
Application of anomaly detection algorithms for detecting SYN flooding attacks. |
Comput. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Hiroshi Fujinoki, Ravi Kumar Boyapati |
Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems. |
Communication, Network, and Information Security |
2006 |
DBLP BibTeX RDF |
|
34 | Basheer Al-Duwairi, G. Manimaran |
Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation. |
INFOCOM |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Dinil Mon Divakaran, Hema A. Murthy, Timothy A. Gonsalves |
Detection of Syn Flooding Attacks using Linear Prediction Analysis. |
ICON |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Yanxiang He, Wei Chen 0006, Bin Xiao 0001 |
Detecting SYN Flooding Attacks Near Innocent Side. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Vasilios A. Siris, Fotini Papagalou |
Application of anomaly detection algorithms for detecting SYN flooding attacks. |
GLOBECOM |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Haining Wang, Danlu Zhang, Kang G. Shin |
Detecting SYN Flooding Attacks. |
INFOCOM |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
The Impact of Flooding Attacks on Network-based Services. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web Services, availability, DoS, attacks, flooding |
29 | Jungtaek Seo |
An Attack Classification Mechanism Based on Multiple Support Vector Machines. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
attack classification, intrusion detection, Internet security |
29 | Martín Casado, Pei Cao, Aditya Akella, Niels Provos |
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. |
IWQoS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Haining Wang, Danlu Zhang, Kang G. Shin |
Change-Point Monitoring for the Detection of DoS Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks |
21 | Gunwoo Nam, Pushkar Patankar, Seung-Hwan Lim, Bikash Sharma, George Kesidis, Chita R. Das |
Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. |
ICDCS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano |
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Zhuo Ning, Jian Gong |
An Intrusion Plan Recognition Algorithm Based on Max-1-Connected Causal Networks. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Max_1_connected Causal Network, belief updating, MAP, NIDS |
21 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. |
IEEE Computer Graphics and Applications |
2006 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix |
21 | Alexander G. Tartakovsky, Boris Rozovskii, Rudolf B. Blazek, Hongjoong Kim |
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. |
IEEE Trans. Signal Process. |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yan Gao 0003, Zhichun Li, Yan Chen 0004 |
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian |
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain |
21 | Ulf Lindqvist, Phillip A. Porras |
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|