Dear all,
I have a network with an hundred hosts in which most of them perform
SYN-Flood attack. My implementation foresees a threshold to detect the
attack (Controller tests the source pretending to be the real destination
since the source doesn't complete 3-way handshake procedure. Only the
honest source can talk to the real destination of the attack) and install a
dropping rule on first switch when the threshold exceed.
I am able to count the number of syn received by the controller with a
counter that I added in it (I expect this should be equal to the number of
the attackers times the threshold, but it is not so ), and if I compare
this number with Wireshark capture I see a lot of packets more.
There is a reason for this behavior? Could be because of the responsiveness
of the controller?

Moreover, I know that Pox is single thread. There is any buffer in which
incoming packets are queued?

Thanks
-- 
Silvia Fichera

Reply via email to