Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

Loading...
Thumbnail Image
Other Title
Authors
Treseangrat, Kiattikul
Kolahi, Samad
Sarrafpour, Bahman
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2015-07-15
Supervisors
Type
Conference Contribution - Paper in Published Proceedings
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
Windows Server 2012
Operating systems
UDP flood attacks
Linux Ubuntu 13
Distributed Denial of Service (DDoS)
network security
computer security
DDoS attacks
ANZSRC Field of Research Code (2020)
Citation
Treseangrat, K., Kolahi, S. S., & Sarrafour, B. A. (2015, July). Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Webserver with Windows Server 2012 and Linux Ubuntu 13. In IEEE (Ed.), Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS) (pp.1-5).
Abstract
Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit defense gave better results than the other solutions.
Publisher
Link to ePress publication
DOI

Copyright holder
Institute of Electical and Electronics Engineers (IEEE)
Copyright notice
All rights reserved
Copyright license
Available online at
This item appears in: