Kritimoy Bosu - Academia.edu (original) (raw)

Kritimoy Bosu

Uploads

Papers by Kritimoy Bosu

Research paper thumbnail of Design and Implement a Real-Time Detection and Defence Mechanism Against the SYN Flood Attack in Server Client System

International Journal of Recent Technology and Engineering (IJRTE), 2019

In the digital world, maintaining information is much difficult. Without security measures and co... more In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibilit...

Research paper thumbnail of Design and Implement a Real-Time Detection and Defence Mechanism Against the SYN Flood Attack in Server Client System

International Journal of Recent Technology and Engineering (IJRTE), 2019

In the digital world, maintaining information is much difficult. Without security measures and co... more In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibilit...

Log In