Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Treseangrat, Kiattikul
Kolahi, Samad
Sarrafpour, Bahman

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2015-07-15

Supervisors

Type

Conference Contribution - Paper in Published Proceedings

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

Windows Server 2012
Operating systems
UDP flood attacks
Linux Ubuntu 13
Distributed Denial of Service (DDoS)
network security
computer security
DDoS attacks

ANZSRC Field of Research Code (2020)

Citation

Treseangrat, K., Kolahi, S. S., & Sarrafour, B. A. (2015, July). Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Webserver with Windows Server 2012 and Linux Ubuntu 13. In IEEE (Ed.), Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS) (pp.1-5).

Abstract

Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit defense gave better results than the other solutions.

Publisher

Link to ePress publication

DOI


Copyright holder

Institute of Electical and Electronics Engineers (IEEE)

Copyright notice

All rights reserved

Copyright license

Available online at

This item appears in: