首页 | 本学科首页   官方微博 | 高级检索  
     

Research on Protecting Against SYN Flooding on a Firewall
引用本文:ZHENG Wei-bin,ZHANG De-yun,LIU Wei-na,GAO Lei,WU Zhan(School of Electronics and Information Engineering,Xi''''an Jiaotong University,Xi''''an 710049,P.R. China). Research on Protecting Against SYN Flooding on a Firewall[J]. 中国邮电高校学报(英文版), 2003, 10(4)
作者姓名:ZHENG Wei-bin  ZHANG De-yun  LIU Wei-na  GAO Lei  WU Zhan(School of Electronics and Information Engineering  Xi''''an Jiaotong University  Xi''''an 710049  P.R. China)
作者单位:School of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,P.R. China
摘    要:1 IntroductionTheSYNFloodingattacksexploitTCP sthree wayhand shakemechanismanditslimitationinmaintaininghalf openconnections,andareper formedbytheattackersubmittingastreamofTCPSYN (connectionrequest)packetstothetargetsys tem ,fillingitsconnectionrequestqueue,andthusdenyinglegitimateusers accesstothetargetsys tem[1 ] .SYNFloodingdoesgreatharmtopopularwebsites,especiallytoe Businessones.Severalapproacheshavebeen proposedtocounterSYNfloodingattacks.SYNCache[2 ] andSYNCookie[3] canmiti…


Research on Protecting Against SYN Flooding on a Firewall
ZHENG Wei-bin,ZHANG De-yun,LIU Wei-na,GAO Lei,WU Zhan. Research on Protecting Against SYN Flooding on a Firewall[J]. The Journal of China Universities of Posts and Telecommunications, 2003, 10(4)
Authors:ZHENG Wei-bin  ZHANG De-yun  LIU Wei-na  GAO Lei  WU Zhan
Abstract:SYN proxy is a firewall's solution to protect against SYN flooding. It plays well under the low rate of attacks, but stumbles under heavy loads. In this paper, a novel approach based on SYN proxy is introduced, its design explained, and its performance evaluated. In this approach, the hash table is used to save half-connection states under light loads, and SYN cookie used under heavy loads. A bitmap is introduced into buckets of the hash table, which speedups of the lookup under SYN Flooding. Bucket length of the hash table is limited to a predefined value, thereby the performance degradation is prevented. A firewall implementing our proposal is tested, which shows that good performance is achieved.
Keywords:TCP  hash  SYN flooding  DoS  firewall
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号