A SYN flooding attack detection approach with hierarchical policies based on self-information

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a detection algorithm with a hierarchical policy on a detection time domain. Compared with other detection methods of entropy measurement, the proposed approach is more efficient in detecting the SYN flooding attack, providing low misjudgment, hierarchical detection policy, and low time complexity. Furthermore, we proposed a detection algorithm with limiting system resources. Thus, the time complexity of our approach is only (log n) with lower time complexity and misjudgment rate than other approaches. Therefore, the approach can detect the denial-of-service/distributed denial-of-service attacks and prevent SYN flooding attacks.

References Powered by Scopus

A Mathematical Theory of Communication

37117Citations
N/AReaders
Get full text

Bandwidth distributed denial of service: Attacks and defenses

46Citations
N/AReaders
Get full text

Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods

39Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System

7Citations
N/AReaders
Get full text

TCPFlood Defender: TCP SYN Flood Attacks Detection in SDN Environment Using Statistical and Ensemble Machine Learning Methods

2Citations
N/AReaders
Get full text

Random Forest Stratified K-Fold Cross Validation on SYN DoS Attack SD-IoV

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Sun, J. R., Huang, C. T., & Hwang, M. S. (2022). A SYN flooding attack detection approach with hierarchical policies based on self-information. ETRI Journal, 44(2), 346–354. https://doi.org/10.4218/etrij.2018-0382

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 1

50%

Researcher 1

50%

Readers' Discipline

Tooltip

Computer Science 2

67%

Engineering 1

33%

Save time finding and organizing research with Mendeley

Sign up for free