This paper proposes a new method and algorithm to efficiently protect web servers against SYN-flooding denial-of-service attacks and flash crowds. The method proposes use of cache to avoid preemption of legitimate SYN messages from the TCP backlog queue in Random Drop (RD) method during SYN-flooding attacks. A new algorithm, the Cached Guaranteed Timer Random Drop (Cached GT-RD), was designed to maximize the effect of the cache during flash crowds. Performance of the Cached GT-RD was evaluated and compared to an existing solution, the Probabilistic Pre-filtering Random Drop (PP-RD), using the simulation method. The experiments demonstrated that Cached GT-RD improved the connection rate and throughput by 67.4 and 73.2 % from PP-RD. Cached GT...
A flash crowd occurs when a stampede of clients attempt to access a resource, e.g., a Web page. It c...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
The rising interest in cloud services has increased the number of security issues in cloud computing...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targete...
Denial of service is characterized by the explicit attempt of the attackers to prevent legitimate us...
Over the years, the Internet has evolved from a tool for the research community to an indispensable ...
A flash crowd event can be characterised by a dramatic increase in requests for a service over a rel...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Currently, online organizational resources and assets are potential targets of several types of atta...
Recent denial of service attacks are mounted by professionalsusing Botnets of tens of thousands of c...
We are currently in the bronze age of information security. The explosive growth in computer systems...
TCP SYN Flood is one of the most wide-spread DoS attack types used on computer networks nowadays. As...
Web servers are usually located in a well-organized data center where these servers connect with the...
Abstract—In this paper, a lightweight mechanism is proposed to mitigate session flooding and request...
A flash crowd occurs when a stampede of clients attempt to access a resource, e.g., a Web page. It c...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
The rising interest in cloud services has increased the number of security issues in cloud computing...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targete...
Denial of service is characterized by the explicit attempt of the attackers to prevent legitimate us...
Over the years, the Internet has evolved from a tool for the research community to an indispensable ...
A flash crowd event can be characterised by a dramatic increase in requests for a service over a rel...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Currently, online organizational resources and assets are potential targets of several types of atta...
Recent denial of service attacks are mounted by professionalsusing Botnets of tens of thousands of c...
We are currently in the bronze age of information security. The explosive growth in computer systems...
TCP SYN Flood is one of the most wide-spread DoS attack types used on computer networks nowadays. As...
Web servers are usually located in a well-organized data center where these servers connect with the...
Abstract—In this paper, a lightweight mechanism is proposed to mitigate session flooding and request...
A flash crowd occurs when a stampede of clients attempt to access a resource, e.g., a Web page. It c...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
The rising interest in cloud services has increased the number of security issues in cloud computing...