Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13
Kolahi, Samad; Treseangrat, Kiattikul; Sarrafpour, Bahman
Citation:Kolahi, S S., Treseangrat, K., & Sarrafpour, B. (2015, February). Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13. In IEEE (Ed.), 2015 International Conference on Communications, Signal Processing, and their Applications (IEEE ICCSPA) (pp.1-5). doi:10.1109/ICCSPA.2015.7081286.
Permanent link to Research Bank record:https://hdl.handle.net/10652/3613
Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, an attacker can easily exhaust the computing resources of its victim within a short period of time. In this paper, we study the impact of a UDP flood attack on TCP throughput, round-trip time, and CPU utilization for a Web Server with the new generation of Linux platform, Linux Ubuntu 13. This paper also evaluates the impact of various defense mechanisms, including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit is found to be the most effective defense.