Exploiting the TCP Simultaneous Connection to
Provide a Low Cost DoS Mitigation Solution
G. Ahamed Nafeez M. volume 6 of 2, 1133 Broadway,Suite 706,New York,NY10010,USA, Institute of Doctors Engineers and scientist(IDES), The Association of Copmuter Electronics and Electrical Engineers, (November 2011)
Abstract
Over the past decade, Denial of Service (DoS)
attacks have become a growing menace in the internet
community. SYN flooding by spoofing IP addresses is the most
common way of achieving this denial of service. Attackers
attempt to exhaust a server’s resources by filling up its backlog
queue and forcing it to drop legitimate connection requests.
By far, the SYN cookie and SYN cache mechanisms have
proved most efficient in countering SYN floods that lead to
denial of service.
However, the cost involved in computing cookies and
allocating resources in the TCP backlog queue is considerably
high. We propose a novel scheme that drastically reduces the
cost of DoS mitigation by applying the concept of simultaneous
handshake, modifying the implementation of the TCP backlog
queue in parallel. The need for SYN cookies has been
completely eliminated. Also, various drawbacks of SYN
cookies have been addressed by this scheme. Through
experiments, it has been found that the cost of this solution is
above six times lesser than the cost of the standard scheme.
Various Linux operating systems and Windows XP have been
used to demonstrate the effectiveness of this scheme in
reducing the cost of mitigation.
%0 Conference Proceedings
%1 ahamednafeezm2011exploiting
%A Ahamed Nafeez M, G Anjana
%B 2
%C 1133 Broadway,Suite 706,New York,NY10010,USA
%D 2011
%E Das, Dr. Vinu V
%I The Association of Copmuter Electronics and Electrical Engineers
%K dos
%N 1
%T Exploiting the TCP Simultaneous Connection to
Provide a Low Cost DoS Mitigation Solution
%U /brokenurl#IJRTET.theaceeeorg
%V 6
%X Over the past decade, Denial of Service (DoS)
attacks have become a growing menace in the internet
community. SYN flooding by spoofing IP addresses is the most
common way of achieving this denial of service. Attackers
attempt to exhaust a server’s resources by filling up its backlog
queue and forcing it to drop legitimate connection requests.
By far, the SYN cookie and SYN cache mechanisms have
proved most efficient in countering SYN floods that lead to
denial of service.
However, the cost involved in computing cookies and
allocating resources in the TCP backlog queue is considerably
high. We propose a novel scheme that drastically reduces the
cost of DoS mitigation by applying the concept of simultaneous
handshake, modifying the implementation of the TCP backlog
queue in parallel. The need for SYN cookies has been
completely eliminated. Also, various drawbacks of SYN
cookies have been addressed by this scheme. Through
experiments, it has been found that the cost of this solution is
above six times lesser than the cost of the standard scheme.
Various Linux operating systems and Windows XP have been
used to demonstrate the effectiveness of this scheme in
reducing the cost of mitigation.
@proceedings{ahamednafeezm2011exploiting,
abstract = {Over the past decade, Denial of Service (DoS)
attacks have become a growing menace in the internet
community. SYN flooding by spoofing IP addresses is the most
common way of achieving this denial of service. Attackers
attempt to exhaust a server’s resources by filling up its backlog
queue and forcing it to drop legitimate connection requests.
By far, the SYN cookie and SYN cache mechanisms have
proved most efficient in countering SYN floods that lead to
denial of service.
However, the cost involved in computing cookies and
allocating resources in the TCP backlog queue is considerably
high. We propose a novel scheme that drastically reduces the
cost of DoS mitigation by applying the concept of simultaneous
handshake, modifying the implementation of the TCP backlog
queue in parallel. The need for SYN cookies has been
completely eliminated. Also, various drawbacks of SYN
cookies have been addressed by this scheme. Through
experiments, it has been found that the cost of this solution is
above six times lesser than the cost of the standard scheme.
Various Linux operating systems and Windows XP have been
used to demonstrate the effectiveness of this scheme in
reducing the cost of mitigation.
},
added-at = {2012-02-06T05:45:00.000+0100},
address = {1133 Broadway,Suite 706,New York,NY10010,USA},
author = {Ahamed Nafeez M, G Anjana},
biburl = {https://www.bibsonomy.org/bibtex/26490ce7e49adc76d8958b4933b962244/idesajith},
editor = {Das, Dr. Vinu V},
interhash = {8bf6045dcc103ca66e91be6cd502b699},
intrahash = {6490ce7e49adc76d8958b4933b962244},
keywords = {dos},
month = {NOVEMBER},
number = 1,
organization = {Institute of Doctors Engineers and scientist(IDES)},
publisher = {The Association of Copmuter Electronics and Electrical Engineers},
series = 2,
timestamp = {2012-02-06T05:45:00.000+0100},
title = {Exploiting the TCP Simultaneous Connection to
Provide a Low Cost DoS Mitigation Solution
},
url = {/brokenurl#IJRTET.theaceeeorg},
volume = 6,
year = 2011
}