Fengli Zhang, Ji Geng, Zhiguang Qin, Mingtian Zhou
{"title":"基于SYN代理和Hop-Count Filter的DDoS攻击检测","authors":"Fengli Zhang, Ji Geng, Zhiguang Qin, Mingtian Zhou","doi":"10.1109/ICCCAS.2007.6251605","DOIUrl":null,"url":null,"abstract":"This paper analyzes the principles of SYN proxy, proposes the two upgrade algorithms of SYN proxy, and gives the ideas for combining the hop-count information filter to defense DDoS, introduces the detecting method of DDoS attacks based on SYN proxy integrated the hop count filter. The test result expresses that this method may detect and defense DDos attack in heavy traffic.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Detecting the DDoS attacks based on SYN proxy and Hop-Count Filter\",\"authors\":\"Fengli Zhang, Ji Geng, Zhiguang Qin, Mingtian Zhou\",\"doi\":\"10.1109/ICCCAS.2007.6251605\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper analyzes the principles of SYN proxy, proposes the two upgrade algorithms of SYN proxy, and gives the ideas for combining the hop-count information filter to defense DDoS, introduces the detecting method of DDoS attacks based on SYN proxy integrated the hop count filter. The test result expresses that this method may detect and defense DDos attack in heavy traffic.\",\"PeriodicalId\":218351,\"journal\":{\"name\":\"2007 International Conference on Communications, Circuits and Systems\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Communications, Circuits and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCAS.2007.6251605\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Communications, Circuits and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCAS.2007.6251605","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting the DDoS attacks based on SYN proxy and Hop-Count Filter
This paper analyzes the principles of SYN proxy, proposes the two upgrade algorithms of SYN proxy, and gives the ideas for combining the hop-count information filter to defense DDoS, introduces the detecting method of DDoS attacks based on SYN proxy integrated the hop count filter. The test result expresses that this method may detect and defense DDos attack in heavy traffic.