﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>2</Volume>
      <Issue>5</Issue>
      <PubDate PubStatus="epublish">
        <Year>2014</Year>
        <Month>3</Month>
        <Day>21</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Defense against SYN Flooding Attacks: A Scheduling Approach</ArticleTitle>
    <VernacularTitle>Defense against SYN Flooding Attacks: A Scheduling Approach</VernacularTitle>
    <FirstPage>1</FirstPage>
    <LastPage>10</LastPage>
    <ELocationID EIdType="doi">10.7508/jist.2014.01.007</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Shahram</FirstName>
        <LastName>Jamali</LastName>
        <Affiliation>computer engineering</Affiliation>
      </Author>
      <Author>
        <FirstName>Gholam</FirstName>
        <LastName>Shaker</LastName>
        <Affiliation>Islamic Azad </Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2014</Year>
      <Month>10</Month>
      <Day>22</Day>
    </History>
    <Abstract>The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flooding attack can be viewed metaphorically as result of an unfair scheduling that gives more opportunity to attack requests but prevents legal connections from getting services. In this paper, we present a scheduling algorithm that ejects the half connection with the longest duration, when number of half open connections reaches to the upper bound. The simulation results show that the proposed defense mechanism improves performance of the under attack system in terms of loss probability of requests and share of regular connections from system resources.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">DoS Attack</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">SYN Flooding</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Scheduling</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">TCP</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Performance</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/14844</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>