Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

reverse path forwarding

biblio

Visible to the public Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13

Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
  • Linux
  • Web servers
  • Web server
  • UDP DDoS flood cyber attack
  • transport protocols
  • Throughput
  • threshold limit
  • TCP throughput
  • security problems
  • round-trip time
  • reverse path forwarding
  • pubcrawl170109
  • network load balancing
  • Linux Ubuntu 13
  • Linux platform
  • access control lists
  • IP verify
  • IP networks
  • Internet world
  • internet
  • Floods
  • file servers
  • distributed denial of service attacks
  • defense mechanisms
  • CPU utilization
  • Computers
  • computer network security
  • Computer crime
  • authorisation
  • ACL
biblio

Visible to the public Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
  • threshold limit
  • network load balancing
  • pubcrawl170109
  • resource allocation
  • reverse path forwarding
  • round-trip time
  • security problems
  • Servers
  • TCP throughputs
  • Load management
  • threshold limit defense
  • Throughput
  • transport protocols
  • UDP DDoS Attack
  • UDP DDoS cyber flood attack
  • Windows Server 2012
  • Windows Sever 2012
  • access control lists
  • Linux Ubuntu 13
  • Linux
  • IP verify
  • IP networks
  • Internet world
  • internet
  • Floods
  • file servers
  • distributed denial of service attacks
  • defense mechanisms
  • cyber security
  • CPU utilization
  • computer network security
  • Computer crime
  • ACL

Terms of Use  |  ©2023. CPS-VO