skip to main content
10.1145/1414558.1414575acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
poster

A lab implementation of SYN flood attack and defense

Published:16 October 2008Publication History

ABSTRACT

A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. SYN flood attack is one of the most common types of DoS. In this lab, we model and simulate a real world network, and we launch a SYN attack against our web server. Through this, we study the nature of the attack and investigate the effectiveness of several approaches in defending against SYN attack. This lab will allow students to anatomize the SYN flooding attack and defense in the lab environment and obtain data and parameters of DoS resilience capability.

References

  1. Alefiya Hussain, John Heidemann, and Christos Papadopoulos, A Framework for Classifying Denial of Service Attacks, In Proceedings of the ACM SIGCOMM Conference, pp. 99--110. Karlsruhe, Germany, ACM. August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. http://www.ethereal.com/Google ScholarGoogle Scholar
  3. http://packetstormsecurity.org/DoS/index2.htmlGoogle ScholarGoogle Scholar
  4. A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks. In Proceedings of ACM SIGCOMM '03, Karlsruhe, Germany, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A lab implementation of SYN flood attack and defense

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology education
        October 2008
        280 pages
        ISBN:9781605583297
        DOI:10.1145/1414558

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • poster

        Acceptance Rates

        Overall Acceptance Rate176of429submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader