Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,154,424 papers from all fields of science
Search
Sign In
Create Free Account
UDP flood attack
Known as:
UDP flood
A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Firewall (computing)
LOIC
SYN flood
Spoofing attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
DETEKSI SERANGAN DAN MITIGASI DDOS UDP FLOODPADA SOFTWARE DEFINED NETWORKMENGGUNAKAN ALGORITMA DECISION TREE
Muhammad Qaidin Syahputra
2020
Corpus ID: 213320799
Software Defined Network (SDN) merupakan paradigma baru dalam manajemen jaringan yang memberikan fasilitas untuk melakukan…
Expand
2018
2018
Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3
Alimuddin Yasin
,
Salman Suleman
Jurnal Teknologi Informasi Indonesia (JTII)
2018
Corpus ID: 199017184
Abstract— Software Defined Network (SDN) adalah teknologi baru dalam jaringan komputer. Dimana dalam arsitektur ini control…
Expand
2016
2016
Analysis of cloudlet completion time during attack on smart grid cloud
S. Mehmi
,
H. Verma
,
A. L. Sangal
International Journal of Cloud Computing
2016
Corpus ID: 2700986
The exceptional advantages of cloud have attracted the organisations to shift their IT business on to cloud. Smart grid is…
Expand
2016
2016
Simulación de un perímetro de seguridad lógica empleando nueva generación de Firewalls para prevenir ataques externos e internos a la granja de servidores de un proveedor de servicios de Internet en…
G. Lopez
,
Patricio Leonardo
2016
Corpus ID: 193578683
En el presente trabajo de titulacion, se exponen los fundamentos teoricos de la red MPLS, la cual, es considerada como una red de…
Expand
2015
2015
Worm Classification and Detection using Data Mining Techniques
Dipali Kharche
,
A. Thakare
2015
Corpus ID: 8246619
Internet worm means separate malware computer programs that repeated itself and in order to spread one computer to another…
Expand
2013
2013
ANALISA SERANGAN DDOS (DISTRIBUTED DENIAL OF SERVICE) TCP FLOOD DAN UDP FLOOD PADA HONEYD
Pambudi Putra Widyastoro Genta
2013
Corpus ID: 129203946
Kebutuhan akan teknologi informasi di era modern ini sangat besar serta dapat diaplikasikan dalam berbagai bidang. Banyak…
Expand
2011
2011
Detection Approach of DDoS Attacks Based on Conditional Random Fields: Detection Approach of DDoS Attacks Based on Conditional Random Fields
Yun Liu
,
Zhi-Ping Cai
,
Ping Zhong
,
Jianrong Yin
,
Jieren Cheng
2011
Corpus ID: 61607244
2011
2011
Selection of parameter for SYN flood source-end detection
Bo Yang
,
Xueyuan Wang
International Conference on Electronic and…
2011
Corpus ID: 31755
DDoS attack has always been a major threat for information security. Among the DDoS methods, SYN flood is the most common. Having…
Expand
2009
2009
Research of detection and defense model for UDP-Flood attack
Wu Shao-hua
2009
Corpus ID: 63176260
The distribution denial of the service attack is the greatest threaten to the internet,especially the TCP Flooding attack and the…
Expand
2004
2004
Detection of UDP-flood attack with hidden Markov models
Junghun Park
,
Lei Huang
,
C.-C. Jay Kuo
SPIE Defense + Commercial Sensing
2004
Corpus ID: 109380097
A scheme that uses the hidden Markov model (HMM) is proposed in this work to detect unauthorized nuisance packets in IP networks…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE