Visible to the public Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13

TitleAnalysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Publication TypeConference Paper
Year of Publication2015
AuthorsKolahi, S. S., Treseangrat, K., Sarrafpour, B.
Conference Name2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
Date Publishedfeb
Keywordsaccess control lists, ACL, authorisation, Computer crime, computer network security, Computers, CPU utilization, defense mechanisms, distributed denial of service attacks, file servers, Floods, Internet, Internet world, IP networks, IP verify, Linux, Linux platform, Linux Ubuntu 13, network load balancing, pubcrawl170109, reverse path forwarding, round-trip time, security problems, TCP throughput, threshold limit, Throughput, transport protocols, UDP DDoS flood cyber attack, Web server, Web servers
Abstract

Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, an attacker can easily exhaust the computing resources of its victim within a short period of time. In this paper, we study the impact of a UDP flood attack on TCP throughput, round-trip time, and CPU utilization for a Web Server with the new generation of Linux platform, Linux Ubuntu 13. This paper also evaluates the impact of various defense mechanisms, including Access Control Lists (ACLs), Threshold Limit, Reverse Path Forwarding (IP Verify), and Network Load Balancing. Threshold Limit is found to be the most effective defense.

DOI10.1109/ICCSPA.2015.7081286
Citation Keykolahi_analysis_2015