{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:21Z","timestamp":1777704621764,"version":"3.51.4"},"reference-count":14,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>TCP SYN flood attack has been one of representative DDoS attack in computer security history. To cope with this, a number of researches have been done, but they have a high false detection rate and are hard to be applicable in network address translation environment which is very common in the real world. To address these problems, we propose an efficient scheme to cope with SYN flood attacks with spoofed IP addresses. Compared to the existing approaches, it achieves the lowest false positive rate of 0.0003% at maximum and detects false IP packets at an earlier point of time, which serve to reduce the impacts of DDoS attacks significantly.<\/jats:p>","DOI":"10.3233\/jifs-169839","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T19:29:20Z","timestamp":1532719760000},"page":"5983-5991","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient detection of TCP Syn flood attacks with spoofed IP addresses"],"prefix":"10.1177","volume":"35","author":[{"given":"Youngjun","family":"Bae","sequence":"first","affiliation":[{"name":"Department of Electronics and Computer Engineering, Hongik University, Korea"}]},{"given":"Intae","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electronics and Computer Engineering, Hongik University, Korea"}]},{"given":"Seong Oun","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Software and Communications Engineering, Hongik University, Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"key":"e_1_3_2_2_2","volume-title":"ACM Operating Systems","author":"Tomlinson R.S.","year":"1975","unstructured":"TomlinsonR.S., Selecting Sequence Numbers, INWG Protocol Note 2, IFIP WorkingGroup 6.1, August 1974. Also in Proceedings of the ACM SIGCOMM\/SIGOPS Interprocess Communications Workshop, (Santa Monica, CA, March 24\u201325, 1975), and ACM Operating Systems."},{"key":"e_1_3_2_3_2","unstructured":"PostelJ. RFC792\u2013 Darpa Internet Program Protocol Specification 1981."},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","unstructured":"CERT AdvisoryCA\u20131996\u201321 TCP-SYN Flooding and IP Spoofing Attacks 2000.","DOI":"10.1016\/S1353-4858(96)90059-8"},{"key":"e_1_3_2_5_2","first-page":"1","article-title":"Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack, Wireless Communications","author":"Tang H.-R.","year":"2009","unstructured":"TangH.-R., XuC., LuoX.-G. and OuyangJ.-Q., Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack, Wireless Communications, Networking and Mobile Computing, 2009, pp. 1\u20136.","journal-title":"Networking and Mobile Computing"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"e_1_3_2_7_2","unstructured":"TempletonS.J. and LevittK.E. detecting spoofed packet the DARPA Information Survivability Conference and Exposition (DISCEX\u201903) 2003."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.132"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"key":"e_1_3_2_10_2","article-title":"Pei Chen Optimized hash lookup for bloom filter based packet routing, Network-Based Information Systems (NBiS)","author":"Li D.","year":"2013","unstructured":"LiD., Pei Chen Optimized hash lookup for bloom filter based packet routing, Network-Based Information Systems (NBiS), 16th International Conference on, 2013.","journal-title":"16th International Conference on"},{"key":"e_1_3_2_11_2","volume-title":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","author":"Lee H.","year":"2007","unstructured":"LeeH., KwonM., HaskerG., PerrigA., BASE an incrementally deployable mechanism for viable IP spoofing prevention, Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007, Singapore."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2008.4783287"},{"key":"e_1_3_2_13_2","article-title":"Detecting SYN flooding attacks","author":"Wang H.","year":"2002","unstructured":"WangH., ZhangD. and ShinK.G., Detecting SYN flooding attacks, Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002.","journal-title":"Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies"},{"issue":"1","key":"e_1_3_2_14_2","first-page":"70","article-title":"An integrated victim-based approach against IP packet flooding denial of service","volume":"4","author":"Mutebi R.M.","year":"2010","unstructured":"MutebiR.M. and RaiI.A., An integrated victim-based approach against IP packet flooding denial of service, International Journal of Computing and ICT Research4(1) (2010), 70\u201380.","journal-title":"International Journal of Computing and ICT Research"},{"key":"e_1_3_2_15_2","unstructured":"http:\/\/www.boho.or.kr\/webprotect\/cyberShelters\/cyberShelters.do April 2016."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169839","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169839","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:38Z","timestamp":1777455698000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"references-count":14,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169839"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169839","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,24]]}}}