Detecting the Source of TCP SYN Flood Attack Using IP Trace Back
Computers connected to networks are exposed to potentially damaging access by unauthorized "Hackers". Denial-of-Service (DoS) attacks throw up an uprising threat to today's internet. TCP SYN flood attack is a most serious form of Dos attack in which the attackers easily exploit the TCP three-way handshake by exhausting the resources of the server and making it unavailable for the legitimate client. This paper mainly focuses on the detection of TCP SYN flood attack by allowing the victim to trace back the appropriate origin of source IP address using efficient packet marking algorithm.