Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,271,849 papers from all fields of science
Search
Sign In
Create Free Account
UDP flood attack
Known as:
UDP flood
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Firewall (computing)
LOIC
SYN flood
Spoofing attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning
Francisco Sales de Lima Filho
,
F. A. F. Silveira
,
A. M. B. Júnior
,
Genoveva Vargas-Solar
,
L. Silveira
Secur. Commun. Networks
2019
Corpus ID: 204894481
Users and Internet service providers (ISPs) are constantly affected by denial-of-service (DoS) attacks. This cyber threat…
Expand
2018
2018
SECURE: Self-Protection Approach in Cloud Resource Management
S. Gill
,
R. Buyya
IEEE Cloud Computing
2018
Corpus ID: 4602409
In the current scenario of cloud computing, heterogeneous resources are located in various geographical locations requiring…
Expand
2018
2018
Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3
Alimuddin Yasin
,
Salman Suleman
Jurnal Teknologi Informasi Indonesia (JTII)
2018
Corpus ID: 199017184
Abstract— Software Defined Network (SDN) adalah teknologi baru dalam jaringan komputer. Dimana dalam arsitektur ini control…
Expand
2017
2017
Contiki-based mitigation of UDP flooding attacks in the Internet of things
Kamaldeep
,
Manisha Malik
,
M. Dutta
International Conference on Computing…
2017
Corpus ID: 776888
As Internet of things (IoT) continue to ensconce into our homes, offices, hospitals, electricity grids and other walks of life…
Expand
2016
2016
Investigation of UDP Bot Flooding Attack
Bijalwan Anchit
,
S. Harvinder
2016
Corpus ID: 64443759
Background/Objectives: This paper presents the analysis of Bot flooding attack which leads to DDOS (Distributed Denial of Service…
Expand
Highly Cited
2016
Highly Cited
2016
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
M. Alkasassbeh
,
Ghazi Al-Naymat
,
Ahmad Hassanat
,
Mohammad Almseidin
2016
Corpus ID: 44576610
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The…
Expand
2016
2016
An intrusion detection system against UDP flood attack and ping of death attack (DDOS) in MANET
A. Acharya
,
K. Arpitha
,
B. Kumar
2016
Corpus ID: 56720709
- DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death…
Expand
2011
2011
Detection Approach of DDoS Attacks Based on Conditional Random Fields: Detection Approach of DDoS Attacks Based on Conditional Random Fields
Yun Liu
,
Zhi-Ping Cai
,
Ping Zhong
,
Jianrong Yin
,
Jieren Cheng
2011
Corpus ID: 61607244
2010
2010
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method
Jie Wang
,
R. Phan
,
J. Whitley
,
D. Parish
10th IEEE International Conference on Computer…
2010
Corpus ID: 18611258
Distributed Denial of Service (DDoS) is a serious computer network attack which can cause extreme performance degradation on the…
Expand
2009
2009
Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
Shafiullah Khan
,
K. Loo
2009
Corpus ID: 18292553
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE