Kritimoy Bosu - Academia.edu (original) (raw)
Uploads
Papers by Kritimoy Bosu
International Journal of Recent Technology and Engineering (IJRTE), 2019
In the digital world, maintaining information is much difficult. Without security measures and co... more In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibilit...
International Journal of Recent Technology and Engineering (IJRTE), 2019
In the digital world, maintaining information is much difficult. Without security measures and co... more In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibilit...