Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

threshold limit

biblio

Visible to the public Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13

Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
  • Linux
  • Web servers
  • Web server
  • UDP DDoS flood cyber attack
  • transport protocols
  • Throughput
  • threshold limit
  • TCP throughput
  • security problems
  • round-trip time
  • reverse path forwarding
  • pubcrawl170109
  • network load balancing
  • Linux Ubuntu 13
  • Linux platform
  • access control lists
  • IP verify
  • IP networks
  • Internet world
  • internet
  • Floods
  • file servers
  • distributed denial of service attacks
  • defense mechanisms
  • CPU utilization
  • Computers
  • computer network security
  • Computer crime
  • authorisation
  • ACL
biblio

Visible to the public Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13

Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
  • threshold limit
  • network load balancing
  • pubcrawl170109
  • resource allocation
  • reverse path forwarding
  • round-trip time
  • security problems
  • Servers
  • TCP throughputs
  • Load management
  • threshold limit defense
  • Throughput
  • transport protocols
  • UDP DDoS Attack
  • UDP DDoS cyber flood attack
  • Windows Server 2012
  • Windows Sever 2012
  • access control lists
  • Linux Ubuntu 13
  • Linux
  • IP verify
  • IP networks
  • Internet world
  • internet
  • Floods
  • file servers
  • distributed denial of service attacks
  • defense mechanisms
  • cyber security
  • CPU utilization
  • computer network security
  • Computer crime
  • ACL

Terms of Use  |  ©2023. CPS-VO