DocumentCode
2735084
Title
Performance Evaluation for Linux under SYN Flooding Attacks
Author
Oshima, Shunsuke ; Nakashima, Takuo
Author_Institution
Yatsushiro Nat. Coll. of Technol., Kumamoto
fYear
2007
fDate
5-7 Sept. 2007
Firstpage
132
Lastpage
132
Abstract
The SYN flooding attack is a DoS(denial of service) method affecting hosts to retain the half-open state and causing to exhaust it´s memory resources. This attack is hardly filtered by routers in such a case that the source IP address is spoofed. In this paper, we present a performance evaluation for Linux FC5 platform under SYN flooding attacks and propose a detective method at an early stage. We implement a attacking program, and observe response packets from the server. Our method explores two features for Linux FC5. Firstly, the syncookie operates merely the initial SYN+ACK response even if SYN requests exceed the backlog value. Secondly, retransmission packets tend to be lost over a smaller sequential SYN requests than 100. We adopt packet loss rate for retransmission as a metric and extract the threshold value as 60% to identify whether the server is attacked or not and set the threshold values for each metric. We have consequently detect the slight variations of response packet if the value exceeds the pre-determined threshold value, then the detective host sends the RST packet to release the half-open state on TCP.
Keywords
Linux; authorisation; Linux FC5 platform; SYN flooding attack; denial of service method; packet loss rate; Computer crime; Educational institutions; Floods; Information science; Linux; Network servers; Protocols; TCPIP; Web and internet services; Web server;
fLanguage
English
Publisher
ieee
Conference_Titel
Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on
Conference_Location
Kumamoto
Print_ISBN
0-7695-2882-1
Type
conf
DOI
10.1109/ICICIC.2007.449
Filename
4427777
Link To Document