Journal on Communications ›› 2013, Vol. 34 ›› Issue (Z1): 285-291.doi: 10.3969/j.issn.1000-436x.2013.z1.038

• Academic communication • Previous Articles     Next Articles

SYN flood attack defense strategy for asymmetric routing

Jian-xi TAO1,3,4,Li ZHOU2,Zhou ZHOU1,4,Wei YANG1,4,Qing-yun LIU1,4,Rong YANG1,4()   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2 National Computer Network Emergency Response Technical Team/Coordination Center, Beijing 100029, China
    3 College of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    4 National Engineering Laboratory for Information Security Technology, Beijing 100093, China
  • Online:2013-08-25 Published:2017-06-23
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National Information Security Program of China (242 Program);Strategic Priority Research Program of the Chinese Academy of Sciences;The National Natural Science Foundation of China

Abstract:

In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. The detection method uses SYN packet rate and destination IP address entropy, and the hierarchical connection management strategy consists of a method based on SYN packet and a method based on data packet. The experimental results show that this proposed method can mitigate the influence brought by SYN flood attack.

Key words: SYN flood, asymmetric routing, connection management, SYN packet rate, destination IP address entropy

No Suggested Reading articles found!