Designed and implemented a SYN Flood Attack simulation to analyze how Denial-of-Service (DoS) attacks exploit vulnerabilities in TCP’s three-way handshake. The project includes:
Python-based TCP Server to act as a victim.
SYN Flood Attack Script using scapy to generate spoofed SYN requests.
Network Traffic Analysis using tcpdump, netstat, and Wireshark.
Defense Mechanisms (Coming Soon): SYN Cookies, Rate Limiting, and Intrusion Detection.