The Attack Principle and Defense Strategy of SYN Flood under Windows

Article Preview

Abstract:

SYN Flood is a typical distributed denial of service attack technology. SYN Flood, which is one of the most popular attack method of DDos, destroys the network by the Loophole occurred when three-way handshake of TCP protocol happens. It describes the principle of SYN Flood attack in the paper, explores defense strategy and implementation method under Windows. These defensive measures can resist the SYN Flood attack rather well, It has good practicability and reference value.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1962-1966

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jun Li. Distributed Defense Against Large-scale DDos Attacks, East China Normal University, (2007).

Google Scholar

[2] Sai Xu. Detection and Protection Against the SYN Flood Attack on Dual Stack Based Firewall, Harbin Institute of Technology, (2013).

Google Scholar

[3] Ian McLean. Windows 2000 TCP/IP Technology inside[M], China Machine Press, (2010).

Google Scholar

[4] Yanhua Pan, Chunxia Cha, Bingfan Zhang, Zongzhou Tian. Research and implementation of SYN Flood attack defense system[J]. Science technology and Engineering, 2010, 10(1): 104-107.

Google Scholar

[5] Chuanlin Wang, Xuedong Guo. Research and implementation of anti SYN Flood attack technology of firewall[J]. Computer Security, 2007. 5: 10-13.

Google Scholar

[6] Haifeng Bao, Jinhui Bao. The Windows9x/Me/2000 registry[M]. Beijing Hope Electronic Press, (2001).

Google Scholar