The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SYN-flooding (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2005 (18) 2006-2007 (18) 2008-2011 (16) 2012-2019 (17) 2020-2023 (6)
Publication types (Num. hits)
article(24) incollection(1) inproceedings(50)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 38 keywords

Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
223Haining Wang, Danlu Zhang, Kang G. Shin SYN-dog: Sniffing SYN Flooding Sources. Search on Bibsonomy ICDCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
185Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang LSAD: Lightweight SYN Flooding Attack Detector. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, network intrusion detection system, SYN flooding
147Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
144Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu Counteract SYN flooding using second chance packet filtering. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF second chance packet filter, security, wireless LAN, DDoS, SYN flooding
136Vladimir V. Shakhov, Hyunseung Choo On Modeling Counteraction against TCP SYN Flooding. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCP SYN flooding, defense mechanism, DDoS attack
129BoonPing Lim, Md. Safi Uddin Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF non-parametric CUSUM, token bucket filtering, network security, network processor, SYN-flooding
112Y. W. Chen Study on the prevention of SYN flooding by using traffic policing. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
109Wei Chen, Dit-Yan Yeung Throttling spoofed SYN flooding traffic at the source. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding
98Bin Xiao 0001, Wei Chen 0006, Yanxiang He, Edwin Hsing-Mean Sha An Active Detecting Method Against SYN Flooding Attack. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
84Ting Xue, Natalija Vlajic Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
83Basheer Al-Duwairi, G. Manimaran Intentional dropping: a novel scheme for SYN flooding mitigation. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
70Wei Chen, Dit-Yan Yeung Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64V. Krishna Nandivada, Jens Palsberg Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni Analysis of a Denial of Service Attack on TCP. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
63Dongqing Yuan, Jiling Zhong A lab implementation of SYN flood attack and defense. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, curriculum, laboratory
55Chun-Hao Yang, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, Meng-Hsun Tsai Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
55Reza Mohammadi 0003, Mauro Conti, Chhagan Lal, Satish C. Kulhari SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
55L. Kavisankar, Chenniappan Chellappan CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
50Sanjay Rawat 0001, Ashutosh Saxena Danger theory based SYN flood attack detection in autonomic network. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory
47Zi-Yang Shen, Ming-Wei Su, Yun-Zhan Cai, Meng-Hsun Tsai Mitigating SYN Flooding and UDP Flooding in P4-based SDN. Search on Bibsonomy APNOMS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Kirill Levchenko, Ramamohan Paturi, George Varghese On the difficulty of scalably detecting network attacks. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication complexity, network intrusion detection
39Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
35Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo Enhancing Security by Embedding Biometric Data in IP Header. Search on Bibsonomy SOFSEM (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack. Search on Bibsonomy IMCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Dalia Nashat, Fatma A. Hussain Multifractal detrended fluctuation analysis based detection for SYN flooding attack. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
34Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang 0002, Yun-Zhan Cai, Meng-Hsun Tsai Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane. Search on Bibsonomy APNOMS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34DongHyuk Kim, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, Minho Park An Effective Defense Against SYN Flooding Attack in SDN. Search on Bibsonomy ICTC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Nan Haymarn Oo, Aung Htein Maw Effective Detection and Mitigation of SYN Flooding Attack in SDN. Search on Bibsonomy ISCIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34T. Sasilatha, S. Balaji, P. Suresh Mohan Kumar An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks. Search on Bibsonomy EAI Endorsed Trans. Energy Web The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Joseph Cosmas Mushi, Mussa Kissaka, Kosmas Kapis ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity. Search on Bibsonomy IEA/AIE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Reza Mohammadi 0003, Reza Javidan, Mauro Conti SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Nenekazi Nokuthala Penelope Mkuzangwe, Fulufhelo Vincent Nelwamondo A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack. Search on Bibsonomy ACIIDS (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Xinyu Liu, Beumjin Cho, Jong Kim 0001 SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. Search on Bibsonomy WISA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
34Lihua Miao, Wei Ding 0001, Jian Gong A real-time method for detecting internet-wide SYN flooding attacks. Search on Bibsonomy LANMAN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
34Shahram Jamali, Vahid Shaker Defense against SYN flooding attacks: A particle swarm optimization approach. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
34Shahram Jamali, Gholam Shaker PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Saravanan Kumarasamy, A. Gowrishankar An Active Defense Mechanism for TCP SYN flooding attacks Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
34Tongguang Zhang Cumulative Sum Algorithm for Detecting SYN Flooding Attacks Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
34Mehdi Ebady Manaa, Angela Amphawan Review of syn-flooding attack detection mechanism Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
34Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang Detecting SYN flooding attacks based on traffic prediction. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Martine Bellaïche, Jean-Charles Grégoire SYN flooding attack detection by TCP handshake anomalies. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Rakesh Kumar Sahu, Narendra S. Chaudhari A performance analysis of network under SYN-flooding attack. Search on Bibsonomy WOCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34 TCP SYN Flooding. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Maciej Korczynski, Lucjan Janowski, Andrzej Duda An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans. Search on Bibsonomy ICC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Laleh Arshadi, Amir-Hossein Jahangir Entropy based SYN flooding detection. Search on Bibsonomy LCN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Martine Bellaïche, Jean-Charles Grégoire SYN Flooding Attack Detection Based on Entropy Computing. Search on Bibsonomy GLOBECOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Bin Xiao 0001, Wei Chen 0006, Yanxiang He An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam A collaborative defense mechanism against SYN flooding attacks in IP networks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Dalia Nashat, Xiaohong Jiang 0001, Susumu Horiguchi Detecting SYN Flooding Agents under Any Type of IP Spoofing. Search on Bibsonomy ICEBE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong Annulling SYN Flooding Attacks with Whitelist. Search on Bibsonomy AINA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Gowri Shankar Annadurai, Saravanan Kumarasamy Defense Mechanism for TCP SYN Flooding Attacks using Compression Techniques. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2008 DBLP  BibTeX  RDF
34Wesley M. Eddy TCP SYN Flooding Attacks and Common Mitigations. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Vasilios A. Siris, Fotini Papagalou Application of anomaly detection algorithms for detecting SYN flooding attacks. Search on Bibsonomy Comput. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Hiroshi Fujinoki, Ravi Kumar Boyapati Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems. Search on Bibsonomy Communication, Network, and Information Security The full citation details ... 2006 DBLP  BibTeX  RDF
34Basheer Al-Duwairi, G. Manimaran Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation. Search on Bibsonomy INFOCOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Dinil Mon Divakaran, Hema A. Murthy, Timothy A. Gonsalves Detection of Syn Flooding Attacks using Linear Prediction Analysis. Search on Bibsonomy ICON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Yanxiang He, Wei Chen 0006, Bin Xiao 0001 Detecting SYN Flooding Attacks Near Innocent Side. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Vasilios A. Siris, Fotini Papagalou Application of anomaly detection algorithms for detecting SYN flooding attacks. Search on Bibsonomy GLOBECOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Haining Wang, Danlu Zhang, Kang G. Shin Detecting SYN Flooding Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Meiko Jensen, Nils Gruschka, Norbert Luttenberger The Impact of Flooding Attacks on Network-based Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, availability, DoS, attacks, flooding
29Jungtaek Seo An Attack Classification Mechanism Based on Multiple Support Vector Machines. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack classification, intrusion detection, Internet security
29Martín Casado, Pei Cao, Aditya Akella, Niels Provos Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. Search on Bibsonomy IWQoS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yi Shi, Xinyu Yang A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Haining Wang, Danlu Zhang, Kang G. Shin Change-Point Monitoring for the Detection of DoS Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks
21Gunwoo Nam, Pushkar Patankar, Seung-Hwan Lim, Bikash Sharma, George Kesidis, Chita R. Das Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano A Study on Detecting Network Anomalies Using Sampled Flow Statistics. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Zhuo Ning, Jian Gong An Intrusion Plan Recognition Algorithm Based on Max-1-Connected Causal Networks. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Max_1_connected Causal Network, belief updating, MAP, NIDS
21Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix
21Alexander G. Tartakovsky, Boris Rozovskii, Rudolf B. Blazek, Hongjoong Kim A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain
21Ulf Lindqvist, Phillip A. Porras Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #75 of 75 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license