SYN flooding attack — Identification and analysis | IEEE Conference Publication | IEEE Xplore