Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,922,529 papers from all fields of science
Search
Sign In
Create Free Account
UDP flood attack
Known as:
UDP flood
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Firewall (computing)
LOIC
SYN flood
Spoofing attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Contiki-based mitigation of UDP flooding attacks in the Internet of things
Kamaldeep
,
Manisha Malik
,
M. Dutta
International Conference on Computing…
2017
Corpus ID: 776888
As Internet of things (IoT) continue to ensconce into our homes, offices, hospitals, electricity grids and other walks of life…
Expand
2016
2016
Investigation of UDP Bot Flooding Attack
Bijalwan Anchit
,
S. Harvinder
2016
Corpus ID: 64443759
Background/Objectives: This paper presents the analysis of Bot flooding attack which leads to DDOS (Distributed Denial of Service…
Expand
2016
2016
UDP Flooding Attack Detection Using Information Metric Measure
Debojit Boro
,
H. Basumatary
,
Tribeni Goswami
,
D. Bhattacharyya
2016
Corpus ID: 62121491
UDP flooding is one of the most pursued DDoS attack among the attackers. Extensive research solutions focused on other DDoS…
Expand
2016
2016
An intrusion detection system against UDP flood attack and ping of death attack (DDOS) in MANET
A. Acharya
,
K. Arpitha
,
B. Kumar
2016
Corpus ID: 56720709
- DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death…
Expand
2016
2016
Simulación de un perímetro de seguridad lógica empleando nueva generación de Firewalls para prevenir ataques externos e internos a la granja de servidores de un proveedor de servicios de Internet en…
G. Lopez
,
Patricio Leonardo
2016
Corpus ID: 193578683
En el presente trabajo de titulacion, se exponen los fundamentos teoricos de la red MPLS, la cual, es considerada como una red de…
Expand
2015
2015
Improved SDN responsiveness to UDP flood attacks
Laura Mutu
,
Rania Saleh
,
A. Matrawy
IEEE Conference on Communications and Network…
2015
Corpus ID: 18854712
This poster proposes the creation of actuating triggers to deal with UDP flood attacks. We focus on improving responsiveness to…
Expand
2013
2013
ANALISA SERANGAN DDOS (DISTRIBUTED DENIAL OF SERVICE) TCP FLOOD DAN UDP FLOOD PADA HONEYD
Pambudi Putra Widyastoro Genta
2013
Corpus ID: 129203946
Kebutuhan akan teknologi informasi di era modern ini sangat besar serta dapat diaplikasikan dalam berbagai bidang. Banyak…
Expand
2012
2012
Choosing parameters for detecting DDoS attack
Shilin Pu
International Conference on Wavelet Active Media…
2012
Corpus ID: 14851251
DDoS attack has always been a major threat for information security. Realizing the complexity and difficulty in dest-end…
Expand
2011
2011
Detection Approach of DDoS Attacks Based on Conditional Random Fields: Detection Approach of DDoS Attacks Based on Conditional Random Fields
Yun Liu
,
Zhi-Ping Cai
,
Ping Zhong
,
Jianrong Yin
,
Jieren Cheng
2011
Corpus ID: 61607244
2011
2011
Evaluación de ataques UDP Flood utilizando escenarios virtuales como plataforma experimental
W. Fuertes
,
F. Rodas
,
D. Toscano
2011
Corpus ID: 108492461
Los ataques por denegacion de servicio (DoS) tienen como proposito imposibilitar el acceso a los servicios de una organizacion…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE