• Home
  • حملات SYN-flooding
    • List of Articles حملات SYN-flooding

      • Open Access Article

        1 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters
        Mohammad Momeny Sorayya Gharravi Fateme Hourali
        TCP connection management is susceptible to a classic attack called SYN-flooding. In this attack, the source sends a large number of SYN segments to the victim system, without completing the third step of the three-step handshaking algorithm. This lead to consuming the More
        TCP connection management is susceptible to a classic attack called SYN-flooding. In this attack, the source sends a large number of SYN segments to the victim system, without completing the third step of the three-step handshaking algorithm. This lead to consuming the resources allocated to communicate with under attack system and bandwidth of the network quickly and, as a result, system cannot continue to work and engage in unnecessary requests. This paper models the attacked system using quadratic theory and maps the problem of defense against SYN-flooding attacks into an optimization problem. Then, using an effective adaptive filter combination with the PSO algorithm, it presents its proposed method and solves this problem. The simulation results show that the proposed defense mechanism has a significant performance in terms of the amount of blocked requests, the likelihood of success in communication, the likelihood of success of the attacker, and the optimal use of the dedicated buffer. Manuscript profile