Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists.
Chun-Hao YangJhen-Ping WuFang-Yi LeeTing-Yu LinMeng-Hsun TsaiPublished in: Sensors (2023)
Keyphrases
- traffic analysis
- detection method
- object detection
- normal traffic
- neighboring nodes
- false positives
- false alarms
- countermeasures
- end to end
- attack detection
- detection algorithm
- ip networks
- anomaly detection
- stepping stones
- detection rate
- automatic detection
- risk management
- video sequences
- computer security
- normal behavior