TRAP: A Three-way handshake server for TCP connection establishment

19Citations
Citations of this article
93Readers
Mendeley users who have this article in their library.

Abstract

Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down. In this paper, we present a three-way handshaking server for Transmission Control Protocol (TCP) connection redirection utilizing TCP header options. When a legitimate client attempted to connect to a server undergoing an SYN-flood DDoS attack, it will try to initiate a three-way handshake. After it has successfully established a connection, the server will reply with a reset (RST) packet, in which a new server address and a secret is embedded. The client can, thus, connect to the new server that only accepts SYN packets with the corrected secret using the supplied secret.

Cite

CITATION STYLE

APA

Hsu, F. H., Hwang, Y. L., Tsai, C. Y., Cai, W. T., Lee, C. H., & Chang, K. W. (2016). TRAP: A Three-way handshake server for TCP connection establishment. Applied Sciences (Switzerland), 6(11). https://doi.org/10.3390/app6110358

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free