IR @ Goa University

Defense techniques of SYN flood attack characterization and comparisons

Show simple item record

dc.contributor.author Ghanti, S.
dc.contributor.author Naik, G.M.
dc.date.accessioned 2018-07-25T10:13:49Z
dc.date.available 2018-07-25T10:13:49Z
dc.date.issued 2018
dc.identifier.citation International Journal of Network Security. 20(4); 2018; 721-729. en_US
dc.identifier.uri http://ijns.femto.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p721-729.pdf
dc.identifier.uri http://irgu.unigoa.ac.in/drs/handle/unigoa/5357
dc.description.abstract Automation systems are being used widely for performing different tasks at homes, offices, and industries. Remote clients access these web based automation system services on the Internet. Web services are also prone to attacks due to SYN flood that deny genuine clients a right to use the services. Therefore such services are required to be secured. The primary purpose of this manuscript is to characterize the defense mechanisms and compare the technical details involved in defense mechanisms of attacks due to SYN flood. This will help the researchers to propose improved and more efficient defense mechanisms. The manuscript furthermore includes the experimental study of the Victim Side SYN Flood (VSSF) attack protection system implemented using a general purpose processor during the attack. Subsequently the study compares the performance of VSSF attack protection system implemented using general purpose processor, with the VSSF attack protection system implemented using NIOS core processor. It is found that the NIOS core processor based protection system performance is better than the general purpose processor based systems. en_US
dc.publisher IJNS en_US
dc.subject Electronics en_US
dc.title Defense techniques of SYN flood attack characterization and comparisons en_US
dc.type Journal article en_US
dc.identifier.impf cs


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IR


Advanced Search

Browse

My Account