{"id":"https://openalex.org/W2131916100","doi":"https://doi.org/10.1109/waina.2008.218","title":"Annulling SYN Flooding Attacks with Whitelist","display_name":"Annulling SYN Flooding Attacks with Whitelist","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2131916100","doi":"https://doi.org/10.1109/waina.2008.218","mag":"2131916100"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/waina.2008.218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100420769","display_name":"Tae-Hyung Kim","orcid":"https://orcid.org/0000-0002-3001-1080"},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tae-Hyung Kim","raw_affiliation_strings":["Pohang Univ. of Sci. & Technol., Pohang#TAB#"],"affiliations":[{"raw_affiliation_string":"Pohang Univ. of Sci. & Technol., Pohang#TAB#","institution_ids":["https://openalex.org/I123900574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102139905","display_name":"Young-Sik Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Young-Sik Choi","raw_affiliation_strings":["[Dept. of Computer and Communications Engineering, Pohang University of Science and Technology, Pohang, Korea]"],"affiliations":[{"raw_affiliation_string":"[Dept. of Computer and Communications Engineering, Pohang University of Science and Technology, Pohang, Korea]","institution_ids":["https://openalex.org/I123900574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100635272","display_name":"Jong Kim","orcid":"https://orcid.org/0000-0002-0484-0790"},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong Kim","raw_affiliation_strings":["Dept. of Computer Science & Engineering, Pohang University of Science and Technology, Pohang, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science & Engineering, Pohang University of Science and Technology, Pohang, Korea","institution_ids":["https://openalex.org/I123900574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103538200","display_name":"Sung Je Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sung Je Hong","raw_affiliation_strings":["Dept. of Computer Science & Engineering, Pohang University of Science and Technology, Pohang, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science & Engineering, Pohang University of Science and Technology, Pohang, Korea","institution_ids":["https://openalex.org/I123900574"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.474,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.713114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"371","last_page":"376"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.7000977}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.79218036},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.76089156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70286137},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.7000977},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.660949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.55082566},{"id":"https://openalex.org/C13355873","wikidata":"https://www.wikidata.org/wiki/Q2920850","display_name":"Connection (principal bundle)","level":2,"score":0.47913167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16030261},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11813408},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.116975635},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/waina.2008.218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":2,"referenced_works":["https://openalex.org/W2139665594","https://openalex.org/W2145185087"],"related_works":["https://openalex.org/W4285173741","https://openalex.org/W3207859108","https://openalex.org/W2735105689","https://openalex.org/W2358991869","https://openalex.org/W2309292492","https://openalex.org/W2106545930","https://openalex.org/W1994311829","https://openalex.org/W1981032420","https://openalex.org/W1486050759","https://openalex.org/W1482833264"],"abstract_inverted_index":{"SYN":[0,48,62,84,115],"flooding":[1,63,85],"is":[2],"one":[3],"of":[4,7,79],"classical":[5],"denial":[6],"service":[8],"(DoS)":[9],"attacks":[10],"abusing":[11],"the":[12,30,47,100],"TCP":[13],"3-way":[14],"handshake":[15],"process.":[16],"This":[17],"attack":[18],"causes":[19],"a":[20,70,92],"server":[21],"not":[22],"to":[23,45,57],"accept":[24],"additional":[25],"connection":[26,36,55,76,81,105],"requests":[27,37,82],"by":[28],"filling":[29],"server's":[31],"backlog":[32],"queue":[33],"with":[34],"malicious":[35],"(SYNpackets).":[38],"Although":[39],"several":[40],"methods":[41],"have":[42],"been":[43],"proposed":[44,101],"solve":[46],"Flooding":[49],"attack,":[50],"they":[51],"cannot":[52],"guarantee":[53],"reliable":[54],"establishments":[56],"clients":[58,110],"under":[59,83],"extremely":[60],"aggressive":[61],"attacks.":[64,86],"In":[65],"this":[66,89],"paper,":[67],"we":[68],"propose":[69],"WhiteList-based":[71],"defense":[72],"scheme":[73,90],"that":[74,99],"increases":[75],"success":[77,106],"ratio":[78,107],"legitimate":[80,109],"We":[87],"implemented":[88],"as":[91],"Linux":[93],"kernel":[94],"module.":[95],"Experimental":[96],"results":[97],"show":[98],"method":[102],"ensures":[103],"high":[104],"for":[108],"and":[111],"effectively":[112],"annuls":[113],"bogus":[114],"flooding.":[116]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2131916100","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-15T17:27:45.837615","created_date":"2016-06-24"}