2015 International Conference on Communications, Signal Processing, and Their Applications (ICCSPA'15) 2015
DOI: 10.1109/iccspa.2015.7081286
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13

Abstract: Abstract-Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, an attacker can easily exhaust the computing resources of its victim within a short period of time. In this paper, we study the impact of a UDP flood attack on TCP throughput, round-trip time, and CPU utilization for a Web Server wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 7 publications
(7 reference statements)
0
17
0
Order By: Relevance
“…In UDP attack, it is possible to transmit a large amount of UDP packets to the system of the victim, thereby leading to saturation of network and reduced availability of bandwidth for authorized service in the victim's system. UDP-based DDoS attack involves the transmission of UDP packets to ports of the victims' machines in a random or precise manner [37]. Conversely, a UDPbased flooding attack entails the random transmission of UDP packets to the ports of the victims' machines.…”
Section: B Exploited Vulnerability Of Ddos Attackmentioning
confidence: 99%
“…In UDP attack, it is possible to transmit a large amount of UDP packets to the system of the victim, thereby leading to saturation of network and reduced availability of bandwidth for authorized service in the victim's system. UDP-based DDoS attack involves the transmission of UDP packets to ports of the victims' machines in a random or precise manner [37]. Conversely, a UDPbased flooding attack entails the random transmission of UDP packets to the ports of the victims' machines.…”
Section: B Exploited Vulnerability Of Ddos Attackmentioning
confidence: 99%
“…This creates a scenario where the port remains open until the connection times out, when another fabricated SYN request is received. This overwhelms the target system's resources and prevents legitimate users from establishing connections [117][118][119][120][121]. Although UDP does not need a handshake to establish a connection, which in itself creates a vulnerability for attacks that overwhelm the connections with large volumes of bogus traffic.…”
Section: Transport (Layer 4)mentioning
confidence: 99%
“…• In case of UDP flood [22], a large volume of packets is sent to the victim host. The victim host becomes busy in serving those requests and thus, legitimate users are interrupted.…”
Section: Typesmentioning
confidence: 99%