Title :
Strengthening and securing the TCP/IP stack against SYN attacks
Author :
Mohamed, A. Baes ; Kandil, A.
Author_Institution :
Arab Acad. for Sci. & Technol., Egypt
Abstract :
This paper analyzes a (DoS) denial of service attack on TCP (transmission control protocol). It is popularly called SYN flooding. It works by an attacker sending many connection requests with spoofed source addresses to a victim´s machine. These requests exhausting the victim´s resources so it´s no longer able to serve any legitimate requests. This paper contributes a detailed analysis of the SYN flooding attack and a discussion of existing and proposed countermeasures. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, the modification of the TCP/IP stack of a given operating system can be performed by an administrator. This method, the tuning of the TCP/IP stack in various operating systems, will be described in depth in our paper.
Keywords :
security of data; synchronisation; transport protocols; SYN flooding attack; TCP/IP stack; denial of service attack; file transfer protocol; operating system; packet filtering; synchronization; transmission control protocol; Bandwidth; Computer crime; Filtering; Filters; Floods; Operating systems; Protection; Protocols; TCPIP; Web server; Acknowledgment (ACK); Denial of Service (DoS); File Transfer Protocol (FTP); Initial Sequence Number (ISN); Synchronization (SYN); Transmission Control Protocol (TCP/IP);
Conference_Titel :
Information Technology Interfaces, 2009. ITI '09. Proceedings of the ITI 2009 31st International Conference on
Conference_Location :
Dubrovnik
Print_ISBN :
978-953-7138-15-8
DOI :
10.1109/ITI.2009.5196159