Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack |
Nugraha, Muhammad
(School of Electronics and Computer Engineering Chonnam National University)
Paramita, Isyana (School of Electronics and Computer Engineering Chonnam National University) Musa, Ardiansyah (School of Electronics and Computer Engineering Chonnam National University) Choi, Deokjai (School of Electronics and Computer Engineering Chonnam National University) Cho, Buseung (Korea Institute of Science and Technology Information (KISTI)) |
1 | C.N. Maregeli, A Study On TCP-SYN Attacks And Their Effects on A Network Infrastructure, Master's Thesis of Delft University of Technology, 2010. |
2 | Transmission Control Protocol, http://www.ietf.org/rfc/rfc793.txt. (Accessed May, 20, 2014) |
3 | TCP Three-way Handshake, http://www.georgecoding.com/index.php/tcpdump-and-3-way-handshake/ (Accessed May, 20, 2014). |
4 | TCP SYN Flooding Attack Process, http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept /denial-of-service-network-syn-flood-attack-understanding.html (Accessed May, 20, 2014). |
5 | SYN Flooding Defense Mechanism in Traditional Network, http://www.tech- mavens.com/synflood.htm (Accessed May, 20, 2014). |
6 | R. Braga, M. Edjard, and A. Passito, "Lightweight DDoS Flooding Attack Detection Using NOX/ OpenFlow," Proceeding of 35th Annual IEEE Conference on Local Computer Networks, pp 408-415, 2010. |
7 | sFlow Version 5, http://sflow.org/sflow_version_5.txt (Accessed May, 20, 2014). |
8 | Jun-Sang Park, Sung-Yun Kim, Dai-Hee Park, and Myung-Sup Kim, "Design and Implementation of an SNMP-based Traffic Flooding Attack Detection System", The Korea Information Processing Society Transactions, 1598-2858, prep, pp, 2009. 과학기술학회마을 DOI |
9 | Tu Xu, Da Ke He, and Yu Zheng, "Detectiong DDoS Attack based on One-Way Connection Density," Proceeding of 10th IEEE Singapore International Conference on Communication Systems, pp. 1-5, 2006. |
10 | H. Wang, D. Zhang, and K.G. Shin, "Detecting SYN Flooding Attacks," Proceeding of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1530-1539, 2002. |
11 | sFlow Sampling Rate, http://blog.sflow.com/2009/06/sampling-rates.html (Accessed May, 20, 2014). |
12 | Hot Spares for DoS attacks, http://static.usenix.org/publications/login/2000-7/apropos.html (Accessed May. 20, 2014). |