• Login
    View Item 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

    Treseangrat, Kiattikul; Kolahi, Samad; Sarrafpour, Bahman

    Thumbnail
    Share
    View fulltext online
    kolahi.pdf (4.081Mb)
    Date
    2015-07-15
    Citation:
    Treseangrat, K., Kolahi, S. S., & Sarrafour, B. A. (2015, July). Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Webserver with Windows Server 2012 and Linux Ubuntu 13. In IEEE (Ed.), Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS) (pp.1-5).
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3612
    Abstract
    Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit defense gave better results than the other solutions.
    Keywords:
    Windows Server 2012, Operating systems, UDP flood attacks, Linux Ubuntu 13, Distributed Denial of Service (DDoS), network security, computer security, DDoS attacks
    ANZSRC Field of Research:
    080303 Computer System Security
    Copyright Holder:
    Institute of Electical and Electronics Engineers (IEEE)
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [147]

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
     

     

    Usage

    Downloads, last 12 months
    64
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankResearch at UnitecContact us

    Help for authors  

    How to add researchOpen Access GuideVersions Toolkit

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142