python3 results.py #This will measure output and give accuracy.
plot.html #Genrated with input request and frequency
TCPSYN.csv #Standard Dataset to simulate requests. (https://data.mendeley.com/datasets/236bd4cjmk)
Output.csv #Dataset file with labeled values.
sudo python3 controller.py #This will take request from your ethernet instead of database.
sudo plot.html #To visualise
The traffic filtering algorithm implemented in this code repository is designed to detect and mitigate TCP SYN flood attacks on fog devices. A SYN flood attack is a type of denial-of-service (DoS) attack in which an attacker sends a large number of SYN requests to a target device, but does not complete the connection process. This can cause the target device to become overwhelmed with half-open connections, making it unable to respond to legitimate traffic.
The algorithm works by monitoring incoming traffic and analyzing the SYN packets to identify potential SYN flood attacks. When an attack is detected, the algorithm takes steps to mitigate the impact of the attack, such as blocking or rate-limiting traffic from the attacking IP address.
The implementation of this algorithm in the code repository includes several components, including packet capture, traffic analysis, and traffic mitigation. The code is written in a python and is designed to be easily integrated into existing fog device software stacks.