dc.contributor.author |
Ghanti, S. |
|
dc.contributor.author |
Naik, G.M. |
|
dc.date.accessioned |
2018-07-25T10:13:49Z |
|
dc.date.available |
2018-07-25T10:13:49Z |
|
dc.date.issued |
2018 |
|
dc.identifier.citation |
International Journal of Network Security. 20(4); 2018; 721-729. |
en_US |
dc.identifier.uri |
http://ijns.femto.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p721-729.pdf |
|
dc.identifier.uri |
http://irgu.unigoa.ac.in/drs/handle/unigoa/5357 |
|
dc.description.abstract |
Automation systems are being used widely for performing different tasks at homes, offices, and industries. Remote clients access these web based automation system services on the Internet. Web services are also prone to attacks due to SYN flood that deny genuine clients a right to use the services. Therefore such services are required to be secured. The primary purpose of this manuscript is to characterize the defense mechanisms and compare the technical details involved in defense mechanisms of attacks due to SYN flood. This will help the researchers to propose improved and more efficient defense mechanisms. The manuscript furthermore includes the experimental study of the Victim Side SYN Flood (VSSF) attack protection system implemented using a general purpose processor during the attack. Subsequently the study compares the performance of VSSF attack protection system implemented using general purpose processor, with the VSSF attack protection system implemented using NIOS core processor. It is found that the NIOS core processor based protection system performance is better than the general purpose processor based systems. |
en_US |
dc.publisher |
IJNS |
en_US |
dc.subject |
Electronics |
en_US |
dc.title |
Defense techniques of SYN flood attack characterization and comparisons |
en_US |
dc.type |
Journal article |
en_US |
dc.identifier.impf |
cs |
|