Article


Article Code : 13930730153522794(DOI : 10.7508/jist.2014.01.007)

Article Title : Defense against SYN Flooding Attacks: A Scheduling Approach

Journal Number : 5 Winter 2014

Visited : 1291

Files : 481 KB


List of Authors

  Full Name Email Grade Degree Corresponding Author
1 Shahram Jamali jamali@uma.ac.ir Associate Professor PhD
2 Gholam Shaker gholamshaker@gmail.com - M.Sc

Abstract

The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flooding attack can be viewed metaphorically as result of an unfair scheduling that gives more opportunity to attack requests but prevents legal connections from getting services. In this paper, we present a scheduling algorithm that ejects the half connection with the longest duration, when number of half open connections reaches to the upper bound. The simulation results show that the proposed defense mechanism improves performance of the under attack system in terms of loss probability of requests and share of regular connections from system resources.