Please use this identifier to cite or link to this item: http://dspace.unimap.edu.my:80/xmlui/handle/123456789/21230
Title: TCP SYN flood attack analysis based on payload
Authors: Siti Hajar, C. Haris
R. Badlishah, Ahmad, Prof. Madya Dr.
Mohd Alif Hasmani, Abd Ghani
Che Muhammad Nor, Che Isa
shajar_charis@yahoo.com
badli@unimap.edu.my
alifhasmani@unimap.edu.my
cmnor@unimap.edu.my
Keywords: Transmission Control Protocol (TCP) Synchronized (SYN) Flood
Anomaly detection
Payload
IP header
TCP header
Issue Date: 16-Oct-2010
Publisher: Universiti Malaysia Perlis (UniMAP)
Series/Report no.: Proceedings of the International Postgraduate Conference on Engineering (IPCE 2010)
Abstract: Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly detection to analyze TCP SYN flood attack based on payload and unusable area. The results show that the proposed detection method can detect TCP SYN Flood in the network through the payload.
Description: International Postgraduate Conference On Engineering (IPCE 2010), 16th - 17th October 2010 organized by Centre for Graduate Studies, Universiti Malaysia Perlis (UniMAP) at School of Mechatronic Engineering, Pauh Putra Campus, Perlis, Malaysia.
URI: http://dspace.unimap.edu.my/123456789/21230
ISBN: 978-967-5760-03-7
Appears in Collections:Conference Papers
R. Badlishah Ahmad, Prof. Ir. Ts. Dr.

Files in This Item:
File Description SizeFormat 
B16 S. H. C. Haris.pdf177.3 kBAdobe PDFView/Open


Items in UniMAP Library Digital Repository are protected by copyright, with all rights reserved, unless otherwise indicated.