Research paper

Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

View original item

About this item

Title
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Content partner
Unitec
Collection
Research Bank
Description

Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify),...

Format
Research paper
Research format
Conference item
Date created
2015-07-15
Creator
Treseangrat, Kiattikul / Kolahi, Samad / Sarrafpour, Bahman
URL
https://hdl.handle.net/10652/3612
Related subjects
Windows Server 2012 / Operating systems / UDP flood attacks / Linux Ubuntu 13 / Distributed Denial of Service (DDoS) / computer security / DDoS attacks / network security / Computer System Security

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

What can I do with this item?

You must always check with Unitec to confirm the specific terms of use, but this is our understanding:

Research icon

Non-infringing use

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

No sharing icon

No sharing

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

No modifying icon

No modifying

You are not allowed to adapt or remix this item into any other works.

You are not allowed to adapt or remix this item into any other works.

No commercial use icon

No commercial use

You may not use this item commercially.

You may not use this item commercially.

View original item

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

Related items

Loading...