2011 ◽  
Vol 5 (7) ◽  
pp. 709-724 ◽  
Author(s):  
Martine Bellaïche ◽  
Jean-Charles Grégoire

2011 ◽  
Vol 181-182 ◽  
pp. 66-71 ◽  
Author(s):  
Fei Xian Sun ◽  
Zhi Gang Wu

This paper explores a novel danger theory based model to aware the situation for TCP SYN flooding attacks. Within in the presented model, the TCP SYN flooding attacks are looked as dangerous exogenous patterns, and induce danger signals to aware the situation of host computers, which is realized by hosted-based artificial immune detectors. After summarizing the danger theory, the model framework, correlative concepts, TCP SYN flooding attack detection, danger signal computation and attack situation awareness methods are described. Following that, the interrelated techniques are compared. Theoretical analysis results show that the proposed model is valid. Thus, it provides a good solution to computer network security.


Author(s):  
Ting-Yu Lin ◽  
Jhen-Ping Wu ◽  
Pei-Hsuan Hung ◽  
Ching-Hsuan Shao ◽  
Yu-Ting Wang ◽  
...  

2009 ◽  
Vol 16C (1) ◽  
pp. 13-20 ◽  
Author(s):  
Jun-Sang Park ◽  
Sung-Yun Kim ◽  
Dai-Hee Park ◽  
Mi-Jung Choi ◽  
Myung-Sup Kim

Sign in / Sign up

Export Citation Format

Share Document