SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN
Abstract
1 Introduction
2 Related Works
Reference | Detection approach | Mitigation approach | Switch-level Modification | Energy Factor Analysis |
AVANTA-Guard[15] | 3-way handshaking check at edge switch | ✗ | ✔ | ✗ |
Packet-Checker[11] | Address mapping | Entire switch port blocking | ✗ | ✗ |
Sinha et al[16] | Entropy | Not discussed | ✗ | ✗ |
ADAM[10] | Entropy + ML | Traffic blocking at destination switch | ✗ | ✗ |
DDoSSource Tracker[7] | ML | Entire switch port blocking | ✗ | ✗ |
Proposed Approach (SYN-Monitor) | Address mapping + SYN proxy | Selective dropping of fake packets from compromised switch ports | ✗ | ✔ |
3 Problem Statement

4 Proposed Solution: SYN-Monitor

4.1 Detection Module
4.2 Mitigation Module

5 Experimental Evaluation and Discussion
5.1 Experimental setup and Implementation
5.2 Experiment-1



5.3 Experiment-2
Defense Solution | Response time (Under Benign) | Response time (Under Attack) |
Normal SDN | 46 millisec | No response |
Packet_Checker[11] | 46.5 millisec | No response |
ADAM [10] | 58.7 millisec | No response |
DDoSSourceTracker [7] | 54.8 millisec | No response |
Proposed Solution (SYN-Monitor) | 46.5 millisec | 67 millisec |
6 Conclusion
References
Index Terms
- SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN
Recommendations
SynFloWatch: A Detection System against TCP-SYN based DDoS Attacks using Entropy in Hybrid SDN
ICDCN '24: Proceedings of the 25th International Conference on Distributed Computing and NetworkingThe emergence of hybrid software-defined networks (SDNs) that combine traditional network infrastructure with SDN creates new security challenges, particularly regarding TCP-SYN-based Distributed Denial-of-Service (DDoS) attacks. These attacks flood ...
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently
Distributed denial of service (DDoS) attacks seriously threaten Internet services yet there is currently no defence against such attacks that provides both early detection, allowing time for counteraction, and an accurate response. Traditional detection ...
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN
AbstractCloud Computing provides an auto-scaling feature for dynamic resource utilization to cope with their customers’ requirements and charge as ‘pay-per-use’. Attackers get the benefit of this auto-scaling feature by flooding DDoS attacks ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 168Total Downloads
- Downloads (Last 12 months)168
- Downloads (Last 6 weeks)89
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in