Abstract
In recent years, damage caused by DoS attacks is real and causing substantive problems. Such threat is widespread from major commercial sites to individual users. Therefore, it is important for network administrators to develop means to comprehend the latest trend of DoS attacks. In this paper, we propose a distributed detecting method for SYN Flood attack which exploits a flow in TCP itself. Our proposed system employs mobile agents to detect SYN Flood attack. We also show the effectiveness of our proposal through experiment of detection of SYN Flood attack in virtual network of simulation environment.
This work was supported by Grant-in-Aid for Young Scientists (B) (21700084).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
SECURITY.nl: http://www.security.nl/article/12088/1/Zombienetwerk_bestond_uit_1.5_milijoen_gehackte_computers.html
GovCert.nl (Dutch Computer Emergency Response Team): http://www.govcert.nl .
Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24(2), 115–139 (2006)
Stacheldraht: http://staff.washington.edu/dittrich/misc/stacheldraht.analysis
Synk4: http://www.hoobie.net/security/exploits/hacking/synk4.c
Kompella, R.R., Singh, S., Varghese, G.: On scalable attack detection in the network. IEEE/ACM Transactions on Networking 15(1), 14–25 (2007)
Wang, H., Zhang, D., Shin, K.G.: Change-point monitoring for the detection of dos attacks. IEEE Transactions on Dependable and Secure Computing 1(4), 193–208 (2004)
DShield: http://www.dshield.org
@Police: http://www.cyberpolice.go.jp
@Police: The system of monitoring syn flood attacks, http://www.cyberpolice.go.jp/server/rd_env/pdf/synflood_detect.pdf
Shinoda, Y., Ikai, K., Itoh, M.: Vulnerabilities of passive internet threat monitors. In: 14th USENIX Security Symposium (SEC 2005), pp. 209–224 (2005)
Katoh, T., Kuzuno, H., Kawahara, T., Watanabe, A., Nakai, Y., Bista, B.B., Takata, T.: A wide area log analyzing system based on mobile agents. In: Computational Intelligence for Modelling, Control and Automation, 2006 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce., November 2006, 7 pages (2006)
ABLA Project, http://sourceforge.jp/projects/abla
Yet Another Network Simulator, http://yans.inria.fr
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Narita, M., Katoh, T., Bista, B.B., Takata, T. (2009). A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents. In: Braubach, L., van der Hoek, W., Petta, P., Pokahr, A. (eds) Multiagent System Technologies. MATES 2009. Lecture Notes in Computer Science(), vol 5774. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04143-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-04143-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04142-6
Online ISBN: 978-3-642-04143-3
eBook Packages: Computer ScienceComputer Science (R0)