Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Detecting SYN Flood Attack Using CSA-nets

google+
Views: 11                 

Author :  Mohammed Alahmadi

Affiliation :  Jeddah University, Newcastle University

Country :  Saudi Arabia

Category :  Computational Science

Volume, Issue, Month, Year :  David C. W, Computer S, December, 2023

Abstract :


Distributed Denial of Service (DDOS) attacks pose a persistent threat to network security by interrupting server functions. One common DDOS attack is the SYN-flood attack, which targets the three-way handshake process of TCP protocol. This technique overwhelms a system by sending a vast number of SYN messages, thereby exhausting its computational and communicative resources. A visual simulation for this scenario offers deeper insights into the intricacies of the TCP-SYN-flood attack. This paper presents a novel approach that combines TCP protocol anomaly detection with visual analysis through Communication Structured Acyclic nets (CSA-nets). The strategy provides a clear visualisation of attack behaviours, granting a deeper understanding of DDOS patterns and their underlying causes. A new concept of TCCSA-nets is introduced. TCCSA-nets allow elaborating on the system’s performance and emphasizing the system’s operations in real-time. This approach allows for the classification of messages as abnormal if their dura- tion exceeds a predetermined time limit. Messages within this time frame are considered normal communication. The effectiveness of this approach was tested on public datasets, demonstrating its capability in detecting SYN-flood attacks.

Keyword :  Formal model, modelling, visualising, analysing, cybersecurity, protocols, threshold detection.

URL :  https://aircconline.com/csit/papers/vol13/csit132301.pdf

User Name : Alahmadi052
Posted 25-12-2023 on 19:31:00 AEDT



Related Research Work

  • Design Of Fast Transient Response, Low Dropout Regulator With Enhanced Steady State Characteristics On The Basis Of Pid Control
  • Melanoma Cell Detection In Lymph Nodes Histopathological Images Using Deep Learning
  • Adaptive Type-2 Fuzzy Second Order Sliding Mode Control For Nonlinear Uncertain Chaotic System
  • Efficient Algorithms For Isogeny Computation On Hyperelliptic Curves: Their Applications In Post-quantum Cryptography

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals