• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13

    Kolahi, Samad; Treseangrat, Kiattikul; Sarrafpour, Bahman

    Thumbnail
    Share
    View fulltext online
    Analysis of UDP DDoS Flood Cyber Attack and Denese Mechanisim on Web Server With Linux (1).pdf (456.8Kb)
    Date
    2015-02-19
    Citation:
    Kolahi, S S., Treseangrat, K., & Sarrafpour, B. (2015, February). Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13. In IEEE (Ed.), 2015 International Conference on Communications, Signal Processing, and their Applications (IEEE ICCSPA) (pp.1-5). doi:10.1109/ICCSPA.2015.7081286.
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3613
    Abstract
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, an attacker can easily exhaust the computing resources of its victim within a short period of time. In this paper, we study the impact of a UDP flood attack on TCP throughput, round-trip time, and CPU utilization for a Web Server with the new generation of Linux platform, Linux Ubuntu 13. This paper also evaluates the impact of various defense mechanisms, including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit is found to be the most effective defense.
    Keywords:
    Windows Server 2012, operating systems, UDP flood attacks, Linux Ubuntu 13, Distributed Denial of Service (DDoS), network security, computer security, DDoS attacks
    ANZSRC Field of Research:
    080303 Computer System Security
    Copyright Holder:
    Institute of Electical and Electronics Engineers (IEEE)

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [150]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    133
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga