Abstract

Connection Management phase of TCP is susceptible to a classic attack that is called SYN-flooding. In this attack, source sends many SYN packets to the victim computer, but does not complete three-way handshaking algorithms. This quickly consumes the resources allocated for communication in the under attack system and hence prevents it from serving other connection requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases the number of legal connections rejected due to limited buffer space. In this paper, the under attack system are modeled by using queuing theory and then a game theoretic approach is employed to defend against SYNflooding attacks. The simulation results show that the proposed defense mechanism improves performance of the under attack system in terms of the ration of blocked connections and the buffer space occupied by attack requests.

Highlights

  • Internet Security is of a great concern as most of our activities are connected to the internet technology

  • A Transmission Control Protocol (TCP) connection is established in what is known as a 3-way handshake

  • Game theory in the wireless network to develop a stable application perception point for the networks create of the selfish nodes, nodes are introduced as players

Read more

Summary

Introduction

Internet Security is of a great concern as most of our activities are connected to the internet technology. One of the security breaches is Denial-ofService (DoS) attack In this the attackers try to prevent legal users from gaining a normal network service[4,25,29]. Chang[6] mentioned a simple queuing model for the SYN-flooding attack. Wang in 29 to evaluate DoS attacks on computer networks used a queuing model. Warrende and Forrest in 30 have presented a model that can detect DoS attacks. In this method, if a program may use more than one source, other programs wait until that program leave the system and free the allocated resources.

Game Theory
SFDM Game
Defense mechanism to SFDM game
Result and Simulation
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call