%0 Journal Article %T A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations %A Deepak Singh Rana %A Naveen Garg %A Sushil Kumar Chamoli %J International Journal of Computer Technology and Applications %D 2012 %I Technopark Publications %X Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed denial of service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of the TCP by sending many SYN request with IP spoofing technique to victim host and exhaust the backlog queue resource of the TCP and deny legitimate user to connect. Capturing the packet flow is very important to detecting the DOS attack. This paper present how the TCP SYN flood takes place and show the number of packets received by the victim server under the attack. %K SYN FLOOD %K TCP %K DDOS %U http://www.ijcta.com/documents/volumes/vol3issue4/ijcta2012030428.pdf