Home // ICNS 2011, The Seventh International Conference on Networking and Services // View article


Stateful or Stateless Flooding Attack Detection?

Authors:
Martine Bellaïche
Jean-Charles Grégoire

Keywords: Denial of Service; SYN Flooding; TCP Handshake; Network Security.

Abstract:
SYN flooding attacks exploit the 3-way handshake characteristic of TCP connection setup to cause denials of service. Many techniques have been proposed for the detection of flooding attacks; most are stateless while a few are stateful. A stateful method keeps specific information on flows of packets while stateless methods will only keep counters on specific packet features. The low performance impact of stateless methods has led to their predominance in practical deployments. We introduce a methodology to support a comparison between methods, which allows to quantify all key factors which can be used to assess and compare performance and see how they can be built into a metric. In this article, we evaluate and compare the performance of two key DoS detection techniques, one stateless and one stateful, and investigate their relative merits.

Pages: 208 to 212

Copyright: Copyright (c) IARIA, 2011

Publication date: May 22, 2011

Published in: conference

ISSN: 2308-4006

ISBN: 978-1-61208-133-5

Location: Venice/Mestre, Italy

Dates: from May 22, 2011 to May 27, 2011