Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS Attack
Citations
21 citations
5 citations
5 citations
Cites background from "Efficient SYN Spoofing Detection an..."
...requests so the legitimate users become incapable of accessing the network even they are eligible for legitimate access to the network resources [5]....
[...]
3 citations
Cites background from "Efficient SYN Spoofing Detection an..."
...Kavinsankar et al.[42] proposed an Efficient SYN Spoofing Detection and Mitigation (ESDMS) Schema....
[...]
1 citations
References
1,866 citations
"Efficient SYN Spoofing Detection an..." refers background in this paper
...One of the active cyber attacks, discussed by [4] the DDoS (Distributed Denial of Service), highly affects the available bandwidth and causes depletion to the system resources, thereby rendering poor QoS to the clients....
[...]
350 citations
306 citations
241 citations
"Efficient SYN Spoofing Detection an..." refers background in this paper
...This section discusses the performance comparison between the proposed ESDMS for mitigating the SYN spoofed packets with the existing SYN cookies [3], HOP count [1], [10], [13], [18], IP puzzle [8] and without defense schemes....
[...]
88 citations
"Efficient SYN Spoofing Detection an..." refers background in this paper
...If DDoS attackers use the spoofed packets to hide their identity, the rate of spoofed attacks has increases, which can be inferred from the results of the spoofed project given [14]....
[...]