UDP flood attack

Known as: UDP flood 
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2017
024620002017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
As Internet of things (IoT) continue to ensconce into our homes, offices, hospitals, electricity grids and other walks of life… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table I
Is this relevant?
2016
2016
  • Sweta Kriplani, Rupam Kesharwani, Shri Ram
  • 2016
Mobile ad hoc networks also known as MANETs have been used extensively for the seamless provisioning of information exchange… (More)
  • figure 1
Is this relevant?
Review
2016
Review
2016
Distributed denials of service (DDOS) attack have strong impact on the cyber world. As far as cyber-attack is concerned that it… (More)
  • figure 10
  • figure 11
Is this relevant?
2015
2015
This poster proposes the creation of actuating triggers to deal with UDP flood attacks. We focus on improving responsiveness to… (More)
  • figure 1
  • figure 2
Is this relevant?
2015
2015
Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2015
2015
  • Yanjie Zhao
  • 2015 IEEE 5th International Conference on…
  • 2015
This paper aims to analyze the influencing factors for TCP throughput so as to provide evidence for optimizing TCP performance… (More)
Is this relevant?
2011
2011
Cyber attacks are continuing to hamper working of Internet services despite increased use of network security systems such as… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2009
Review
2009
The main objective of DoS attacks is either to completely tie up certain resources or to bring down an entire network so that the… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2008
2008
This paper proposes a system for lightweight detection of DoS attacks, called LD<sup>2</sup>. Our system detects attack… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper we present an analysis of Shaft, an example of malware used in distributed denial of service (DDoS) attacks. This… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?