Visible to the public Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

TitleAnalysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Publication TypeConference Paper
Year of Publication2015
AuthorsTreseangrat, K., Kolahi, S. S., Sarrafpour, B.
Conference Name2015 International Conference on Computer, Information and Telecommunication Systems (CITS)
Keywordsaccess control lists, ACL, Computer crime, computer network security, CPU utilization, cyber security, defense mechanisms, distributed denial of service attacks, file servers, Floods, Internet, Internet world, IP networks, IP verify, Linux, Linux Ubuntu 13, Load management, network load balancing, pubcrawl170109, resource allocation, reverse path forwarding, round-trip time, security problems, Servers, TCP throughputs, threshold limit, threshold limit defense, Throughput, transport protocols, UDP DDoS Attack, UDP DDoS cyber flood attack, Windows Server 2012, Windows Sever 2012
Abstract

Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit defense gave better results than the other solutions.

DOI10.1109/CITS.2015.7297731
Citation Keytreseangrat_analysis_2015