Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 106))

  • 1402 Accesses

Abstract

This paper described the basic principles of SYN flood attacks, and then described in detail the implementation of two more effective and convenient defense method, SYN-cookie technology and state-based monitoring of the source address technology. SYN-cookie technology achieved a stateless handshake, to prevent the resources consumption of SYN flood. Based on monitoring of the source address state technology can connect to each server’s IP address to monitor the status of the initiative to take measures to prevent SYN flood attacks. These two technologies are the most mature and proven technology for the defense of all SYN flood attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yan, X., Wang, Q., Li, M.: SYN Flood Attacks and Prevention. Computer Applications (2000)

    Google Scholar 

  2. Sun, X., Zhu, X., Wang, Y.: DDoS TCP Flood Attacks, and Under the Measures. Network Security Technology and Application (2004)

    Google Scholar 

  3. Li, L., Zhao, Y., Chen, C.: TCP SYN Flooding and Coping Strategies Principle. Web and Application (2003)

    Google Scholar 

  4. Chen, B.: SYN Flood Attack Principle Implementation and Prevention. Computer Applications and Research (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wei, X. (2011). Analysis and Protection of SYN Flood Attack. In: Jin, D., Lin, S. (eds) Advances in Computer Science, Intelligent System and Environment. Advances in Intelligent and Soft Computing, vol 106. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23753-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23753-9_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23752-2

  • Online ISBN: 978-3-642-23753-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics