{"id":66378,"date":"2021-10-26T09:01:16","date_gmt":"2021-10-26T09:01:16","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66378"},"modified":"2022-01-04T14:18:06","modified_gmt":"2022-01-04T14:18:06","slug":"detection-and-prevention-of-tcp-syn-flood-dos-attacks-concepts","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66378","title":{"rendered":"Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;140399&#8243;]Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avan\u00e7adas<br \/>\nJeremias Tavares, Master Degree Student at Instituto Superior de Tecnologias Avan\u00e7adas[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2021%2F10%2FDetectionPreventionTCPSYNFloodDoSAttacksConcepts.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;463239&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;304106&#8243;]Pedro Ramos Brandao, Jeremias Tavares, <strong>Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts <\/strong><\/p>\n<p>DOI: 10.31112\/kriativ-tech-2021-10-57[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;110676&#8243;]Internet security is a topic of high importance, and in recent years it has gained greater popularity with the growing wave of DoS attacks perpetuated through TCP SYN Flood. This kind of attack has several types of motivation: political, unfair competition, human evil. It is intended to deepen the concepts related to this type of attack architecture and which vulnerabilities are exploited that possibly facilitate the success of the SYN Flood. The central attack prevention systems, IDS and IPS, are presented conceptually. A simulation of the attack in a virtually recreated environment is depicted as proof of concept and execution. In contrast, there is evidence of the greater demand and growing sophistication of the means of detection and prevention using modern technologies. [\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;133452&#8243;]Cybersecurity, IDS, IPS, SYN Flood, DoS[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;174772&#8243;][1] A. Verma, R. Saha, G. Kumar, and T. Kim, &#8220;The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions&#8221;, <em>Appl. Sci.<\/em>, vol. 11, no. 10, 2021, doi: 10.3390\/app11104682.<\/p>\n<p>[2] A. E. Ibor, F. A. Oladeji, O. B. Okunoye, and O. O. Ekabua, &#8220;Conceptualisation of Cyberattack prediction with deep learning&#8221;, <em>Cybersecurity<\/em>, vol. 3, no. 1, 2020, doi: 10.1186\/s42400-020-00053-7.<\/p>\n<p>[3] Y. Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, &#8220;Tiresias: Predicting Security Events Through Deep Learning&#8221;, in <em>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security<\/em>, 2018, pp. 592\u2013605, doi: 10.1145\/3243734.3243811.<\/p>\n<p>[4] K. K. Nguyen, D. T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, &#8220;Cyberattack detection in mobile cloud computing: A deep learning approach&#8221;, 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1-6 2018, <a href=\"http:\/\/hdl.handle.net\/10453\/131928\">http:\/\/hdl.handle.net\/10453\/131928<\/a>.<\/p>\n<p>[5] Q. Zhang, K. Liu, Y. Xia, &amp; A. Ma, &#8220;Optimal Stealthy Deception Attack Against Cyber-Physical Systems&#8221;, <em>IEEE transactions on cybernetics<\/em>, <em>50<\/em>(9), 2019, 3963\u20133972. https:\/\/doi.org\/10.1109\/TCYB.2019.2912622<\/p>\n<p>[6] M. Al-Qatf, Y. Lasheng, M. Al-Habib, K. Al-Sabahi, &#8220;Deep learning approach combining sparse autoencoder with SVM for network intrusion detection&#8221;, IEEE Access 6, pp. 843\u2013856, 2018.<\/p>\n<p>[7] B. Bouyeddou, B. Kadri, F. Harrou, Y. Sun, &#8220;DDOS-attacks detection using an efficient measurement-based statistical mechanism&#8221;, <em>Eng. Sci. Technol. an Int. J.<\/em>, vol. 23, no. 4, pp. 870\u2013878, 2020, doi: 10.1016\/j.jestch.2020.05.002.<\/p>\n<p>[8] S. Shin, V. Yegneswaran, P. Porras, G. Gu, &#8220;AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks&#8221;, in <em>Proceedings of the 2013 ACM SIGSAC Conference on Computer &amp;amp; Communications Security<\/em>, 2013, pp. 413\u2013424, doi: 10.1145\/2508859.2516684.<\/p>\n<p>[9] M. Junaid <em>et al.<\/em>, &#8220;An Indigenous Solution for SYN Flooding&#8221;, <em>Rev. GEINTEC-GESTAO Inov. E Tecnol.<\/em>, vol. 11, no. 4, pp. 2998\u20133022, 2021<\/p>\n<p>[10] M. Rahouti, K. Xiong, N. Ghani, F. Shaikh, &#8220;SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks&#8221;, <em>IET Networks<\/em>, vol. 10, no. 2, pp. 76\u201387, 2021, doi: https:\/\/doi.org\/10.1049\/ntw2.12009.<\/p>\n<p>[11] N. McKeown <em>et al.<\/em>, &#8220;OpenFlow: Enabling innovation in campus networks&#8221;, <em>Comput. Commun. Rev.<\/em>, vol. 38, pp. 69-74, 2008, doi: 10.1145\/1355734.1355746.<\/p>\n<p>[12] E. Grimit, T. Gneiting, V. Berrocal, N.A. Johnson, &#8220;The continuously ranked probability score for circular variables and its application to mesoscale forecast ensemble verification&#8221;, Quart. J. R. Meteorol. Soc. 132 (621C) 2006, <a href=\"https:\/\/doi.org\/10.1256\/qj.05.235\">https:\/\/doi.org\/10.1256\/qj.05.235<\/a>.<\/p>\n<p>[13] J. Matheson, R. Winkler, &#8220;Scoring rules for continuous probability distributions&#8221;, Manage. Sci. 22 (10) 1087\u20131096, 1976, <a href=\"https:\/\/doi.org\/10.1287\/mnsc.22.10.1087\">https:\/\/doi.org\/10.1287\/mnsc.22.10.1087<\/a>.<\/p>\n<p>[14] S. Fichera, L. Galluccio, S. Grancagnolo, G. Morabito, S. Palazzo, &#8220;Operetta: An OpenFlow-based remedy to mitigate TCP synflood attacks against web servers&#8221;, Computer Networks, 92:89\u2013100, 2015.<\/p>\n<p>[15] R. Mohammadi, R. Javidan, M. Conti. &#8220;Slicots: An sdn-based lightweight countermeasure for TCP syn flooding attacks&#8221;, IEEE Transactions on Network and Service Management, 2017.<\/p>\n<p>[16] B. A. Khalaf <em>et al.<\/em>, &#8220;A simulation study of syn flood attack in a cloud computing environment,&#8221; <em>AUS J.<\/em>, vol. 26, no. 1, pp. 188\u2013197, 2019.[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avan\u00e7adas<br \/>\nJeremias Tavares, Master Degree Student at Instituto Superior de Tecnologias Avan\u00e7adas<br \/>\nDOI: 10.31112\/kriativ-tech-2021-10-57<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66378"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66378"}],"version-history":[{"count":3,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66378\/revisions"}],"predecessor-version":[{"id":66425,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66378\/revisions\/66425"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}