Download now Free registration required
Threats have become a big problem since the past few years as computer viruses are widely recognized as a significant computer threat. However, the role of Information Technology security must be revisit again since it is too often. IT security managers find themselves in the hopeless situation of trying to uphold a maximum of security as requested from management. This paper will focus on Transmission Control Protocol Synchronize Flooding attack detections using the Internet Protocol header as a platform to detect threats, especially in the IP protocol and TCP protocol, and check packets using anomaly detection system which has many advantages, and applied it under the open source Linux.
- Format: PDF
- Size: 564.6 KB