DocumentCode :
260810
Title :
SYN flooding attack — Identification and analysis
Author :
Geetha, K. ; Sreenath, N.
Author_Institution :
Dept. of Comput. Sci., Periyar Arts Coll., Cuddalore, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
7
Abstract :
This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victim´s resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.
Keywords :
mobile ad hoc networks; multimedia communication; quality of service; routing protocols; telecommunication security; transport protocols; SYN flooding attack; TCP SYN; denial of service attacks; end to end delay; mobile adhoc networks; multimedia data; packet delivery ratio; quality of service; routing protocols; three way handshake; transmission control protocol; Delays; Jitter; Multimedia communication; Routing protocols; Servers; Throughput; Mobile Adhoc Networks; SYN Flooding attacks; Transmission Control Protocol; average end to end delay; packetd delivery ratio; throughput and jitter;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7033828
Filename :
7033828
Link To Document :
بازگشت