Tag

defense algorithm

1 views collected around this technical thread.

Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSPacket AnalysisTCP reflection
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies