iRepository at Perpustakaan UniMAP >
UNIVERSITY LIBRARY >
Conference Papers >
Please use this identifier to cite or link to this item:
|Title: ||TCP SYN flood attack analysis based on payload|
|Authors: ||Siti Hajar, C. Haris|
R. Badlishah, Ahmad, Prof. Madya Dr.
Mohd Alif Hasmani, Abd Ghani
Che Muhammad Nor, Che Isa
|Keywords: ||Transmission Control Protocol (TCP) Synchronized (SYN) Flood;Anomaly detection;Payload;IP header;TCP header|
|Issue Date: ||16-Oct-2010|
|Publisher: ||Universiti Malaysia Perlis (UniMAP)|
|???metadata.dc.publisher.department???: ||Centre for Graduate Studies|
|Series/Report no.: ||Proceedings of the International Postgraduate Conference on Engineering (IPCE 2010)|
|Abstract: ||Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly detection to analyze TCP SYN flood attack based on payload and unusable area. The results show that the proposed detection method can detect TCP SYN Flood in the network through the payload.|
|Description: ||International Postgraduate Conference On Engineering (IPCE 2010), 16th - 17th October 2010 organized by Centre for Graduate Studies, Universiti Malaysia Perlis (UniMAP) at School of Mechatronic Engineering, Pauh Putra Campus, Perlis, Malaysia.|
|Appears in Collections:||Conference Papers|
R. Badlishah Ahmad, Prof. Dr.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.