Skip to main content

ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity

  • Conference paper
  • First Online:
  • 2995 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10868))

Abstract

Dynamics in IP-based SYN-flooding, whereby attacker can create slave daemon generators and distribute attacks, have frightened integration of mobile services over mobile data connectivity. This study proposes unsupervised learning model inspired by three ingredients of ants foraging behaviour to improve accuracy in detection of SYN dynamics and reduces the number of falsified alarms. The evaluation establishes simulation environment and analyse collected data using Mean Value Analysis (MVA) method, whereby results prove the model to dynamically classify, detect and wedge-out SYN-flooding at 58.4% utilization of GGSN gateway.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G/WiMax wireless networks. Comput. Netw. 53(15), 2601–2616 (2010)

    Article  Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Pearson Education Inc, Upper Saddle River (2005)

    Google Scholar 

  3. Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley, West Sussex (2008)

    Book  Google Scholar 

  4. Zou, C.C., Duffield, N., Towsley, D., Gong, W.: Adaptive defense against various network attacks. IEEE J. Sel. Areas Commun. 24(10), 1877–1887 (2006)

    Article  Google Scholar 

  5. Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Comput. Commun. 29, 1433–1442 (2006)

    Article  Google Scholar 

  6. Ohsita, Y., Ata, S., Murata, M.: Detecting distributed denial-of-service attacks by analysing TCP SYN packets statistically. IEICE Trans. Commun. 89(10), 2868–2877 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph C. Mushi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mushi, J.C., Kissaka, M., Kapis, K. (2018). ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity. In: Mouhoub, M., Sadaoui, S., Ait Mohamed, O., Ali, M. (eds) Recent Trends and Future Technology in Applied Intelligence. IEA/AIE 2018. Lecture Notes in Computer Science(), vol 10868. Springer, Cham. https://doi.org/10.1007/978-3-319-92058-0_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92058-0_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92057-3

  • Online ISBN: 978-3-319-92058-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics