An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks

碩士 === 國立清華大學 === 資訊工程學系 === 94 === In recent years, DDoS attacks occur frequently and cause a great deal of damage to enterprises that provide network services. With the growth of the network, almost every enterprise provides more and more services on the network, like Web service, Mail service, Ft...

Full description

Bibliographic Details
Main Authors: Tzeng-Yu Chen, 陳宗右
Other Authors: Hung-Min Sun
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/36453050738828817765
id ndltd-TW-094NTHU5392126
record_format oai_dc
spelling ndltd-TW-094NTHU53921262015-12-16T04:42:36Z http://ndltd.ncl.edu.tw/handle/36453050738828817765 An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks 多重服務環境下抵擋TCPSYNFloodingDDoS攻擊之入侵防禦系統 Tzeng-Yu Chen 陳宗右 碩士 國立清華大學 資訊工程學系 94 In recent years, DDoS attacks occur frequently and cause a great deal of damage to enterprises that provide network services. With the growth of the network, almost every enterprise provides more and more services on the network, like Web service, Mail service, Ftp service, and so on. If these services suffer the DDoS attack, it will cause great losses to the enterprise. The famous type of the DDoS attack is TCP SYN flooding attack and it is based on the vulnerability of the TCP three-way handshake. The firewall and intrusion detection system are not effectively to defend this type of attack. There is still not a completed solution to defend this attack. In this thesis, we collect the legitimate IP addresses in the databases for each service and protect these services according to these databases. We also create a backlog queue for each service that we can detect the attack by checking it. When attack is detected, the packet filtering mechanism will be activated to protect the victim services. There are five characteristics in our system: (1) Protecting multi-service without knowing any information about these services. (2) Detecting the attack and activate the packet filter instantly. (3) The complexity of IP searching algorithm is only O (n), where n is the number of the under-attack service. It will reduce the delay of the legitimate users. (4) We can instantly find that the attacker uses the legitimate IP address to do the attack and then we filter out this IP address. (5) The system can be built in edge router, NAT server or the protected server. With our proposed mechanism, we can effectively defend the TCP SYN flooding attack and successfully provide the service for legitimate users. Finally, we will do the experiment to evaluate this mechanism and analyze the system performance, effectiveness and influence of the legitimate users. We will show that this mechanism is effectively to protect multi-service against TCP SYN flooding attack. Hung-Min Sun 孫宏民 2006 學位論文 ; thesis 71 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立清華大學 === 資訊工程學系 === 94 === In recent years, DDoS attacks occur frequently and cause a great deal of damage to enterprises that provide network services. With the growth of the network, almost every enterprise provides more and more services on the network, like Web service, Mail service, Ftp service, and so on. If these services suffer the DDoS attack, it will cause great losses to the enterprise. The famous type of the DDoS attack is TCP SYN flooding attack and it is based on the vulnerability of the TCP three-way handshake. The firewall and intrusion detection system are not effectively to defend this type of attack. There is still not a completed solution to defend this attack. In this thesis, we collect the legitimate IP addresses in the databases for each service and protect these services according to these databases. We also create a backlog queue for each service that we can detect the attack by checking it. When attack is detected, the packet filtering mechanism will be activated to protect the victim services. There are five characteristics in our system: (1) Protecting multi-service without knowing any information about these services. (2) Detecting the attack and activate the packet filter instantly. (3) The complexity of IP searching algorithm is only O (n), where n is the number of the under-attack service. It will reduce the delay of the legitimate users. (4) We can instantly find that the attacker uses the legitimate IP address to do the attack and then we filter out this IP address. (5) The system can be built in edge router, NAT server or the protected server. With our proposed mechanism, we can effectively defend the TCP SYN flooding attack and successfully provide the service for legitimate users. Finally, we will do the experiment to evaluate this mechanism and analyze the system performance, effectiveness and influence of the legitimate users. We will show that this mechanism is effectively to protect multi-service against TCP SYN flooding attack.
author2 Hung-Min Sun
author_facet Hung-Min Sun
Tzeng-Yu Chen
陳宗右
author Tzeng-Yu Chen
陳宗右
spellingShingle Tzeng-Yu Chen
陳宗右
An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
author_sort Tzeng-Yu Chen
title An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
title_short An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
title_full An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
title_fullStr An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
title_full_unstemmed An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks
title_sort effective intrusion prevention system to protect multi-services against tcp syn flooding ddos attacks
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/36453050738828817765
work_keys_str_mv AT tzengyuchen aneffectiveintrusionpreventionsystemtoprotectmultiservicesagainsttcpsynfloodingddosattacks
AT chénzōngyòu aneffectiveintrusionpreventionsystemtoprotectmultiservicesagainsttcpsynfloodingddosattacks
AT tzengyuchen duōzhòngfúwùhuánjìngxiàdǐdǎngtcpsynfloodingddosgōngjīzhīrùqīnfángyùxìtǒng
AT chénzōngyòu duōzhòngfúwùhuánjìngxiàdǐdǎngtcpsynfloodingddosgōngjīzhīrùqīnfángyùxìtǒng
AT tzengyuchen effectiveintrusionpreventionsystemtoprotectmultiservicesagainsttcpsynfloodingddosattacks
AT chénzōngyòu effectiveintrusionpreventionsystemtoprotectmultiservicesagainsttcpsynfloodingddosattacks
_version_ 1718152341442527232