Academic literature on the topic 'UDP attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'UDP attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "UDP attacks"

1

Fatkieva, R. R., A. S. Sudakov, and A. S. Nersisyan. "Key Characteristics of Network Traffic to Identify DDoS Attacks." LETI Transactions on Electrical Engineering & Computer Science 17, no. 8 (2024): 65–80. http://dx.doi.org/10.32603/2071-8985-2024-17-8-65-80.

Full text
Abstract:
Modern methods of analyzing and protecting network infrastructure against DDoS (Distributed Denial of Service) attacks are discussed. A DDoS detection model has been developed using statistical techniques, which highlights the main stages of the attacks and key characteristics of network traffic that are crucial for detecting an attack. Potential and attack power are introduced as main concepts in assessing DDoS activity. To identify the type of attack, it is suggested to increase the sensitivity of the model by identifying key characteristics that distinguish between different attack stages.
APA, Harvard, Vancouver, ISO, and other styles
2

Tumbinskaya, Marina V., Vasily V. Vоlkоv, and Bulat G. Zagidullin. "Use of statistical methods for analysis and forecast of udp-flood attacks." Journal Of Applied Informatics 15, no. 89 (2020): 85–102. http://dx.doi.org/10.37791/2687-0649-2020-15-5-85-102.

Full text
Abstract:
Web resources are an integral part of the life of a modern person, who are now more and more often subjected to hacker attacks. The most popular types of attacks are the SQL-injections and cross-site scripting, but DDoS attacks continue to be in the top 10 of network attacks and lead to serious crashes and failures of web resources. The most common type of DDoS attack is UDP flood attack, based on the infinite sending of UDP packets to ports of various UDP services. The scientific novelty of the work lies in the fact that to increase the level of security of web resources a medium-term forecas
APA, Harvard, Vancouver, ISO, and other styles
3

Riyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as d
APA, Harvard, Vancouver, ISO, and other styles
4

Nuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed r
APA, Harvard, Vancouver, ISO, and other styles
5

Warcita, Kurniabudi, and Eko Arip Winanto. "Detection of UDP Flooding DDoS Attacks on IoT Networks Using Recurrent Neural Network." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 13, no. 3 (2024): 471–81. https://doi.org/10.23887/janapati.v13i3.79601.

Full text
Abstract:
Internet of Thing (IoT) is a concept where an object can transfer data through a network without requiring human interaction. Complex IoT networks make it vulnerable to cyber attacks such as DDoS UDP Flood attacks, UDP Flood attacks can disrupt IoT devices. Therefore, this study proposes an attack detection method using a deep learning approach with the Recurrent Neural Network (RNN) method. This study uses Principle Component Analysis (PCA) to reduce the feature dimension, before learning using RNN. The purpose of this study is to test the combined performance of the PCA and RNN methods to de
APA, Harvard, Vancouver, ISO, and other styles
6

Tung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (2020): 1239. http://dx.doi.org/10.3390/electronics9081239.

Full text
Abstract:
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks
APA, Harvard, Vancouver, ISO, and other styles
7

Nedyalkov, Ivan. "Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams." Future Internet 17, no. 4 (2025): 139. https://doi.org/10.3390/fi17040139.

Full text
Abstract:
This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks. The studied VoIP platform is the Asterisk FreePBX. A simple IP network model was developed for the purpose of the study. The used platform for the modeling of IP networks is GNS3. The study is conventionally divided into two parts: in the first part, only voice streams are exchanged in the network, and the server is subjected to a UDP DoS attack,
APA, Harvard, Vancouver, ISO, and other styles
8

Alexis Fidele, Kagiraneza, Suryono, and Wahyul Amien Syafei. "Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment." E3S Web of Conferences 202 (2020): 15003. http://dx.doi.org/10.1051/e3sconf/202020215003.

Full text
Abstract:
Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environme
APA, Harvard, Vancouver, ISO, and other styles
9

Joseph, Ofir, Avshalom Elmalech, and Chen Hajaj. "Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning." Electronics 12, no. 5 (2023): 1091. http://dx.doi.org/10.3390/electronics12051091.

Full text
Abstract:
Covert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different layers, such as the underlying real-time transport protocol (RTP) which uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packet streams to punch a hole through Network address translation (NAT). This paper presents different innovative attack methods utilizing covert communication and RTP channels to spread malware or to crea
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks take full advantage of distributed networks by sending a relentless barrage of requests to a target server to disrupt the regular operation of the server. The main difference between a DDoS attack and a traditional Denial of Service (DoS) attack is its decentralized nature. This characteristic increases the attack's impact and thus creates incredible difficulty in prevention. Traditional DDoS strategies cover flooding attacks (e.g., TCP SYN and UDP floods), protocol usage techniques (e.g., SYN floods and the infamous Ping of Death), and resource exh
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "UDP attacks"

1

Muharish, Essa Yahya M. "PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/342.

Full text
Abstract:
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are
APA, Harvard, Vancouver, ISO, and other styles
2

Plašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.

Full text
Abstract:
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video sam
APA, Harvard, Vancouver, ISO, and other styles
3

Jawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.

Full text
Abstract:
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem behöver adresseras. Den här rapporten presenterar ett antal existerande metoder för att upptäcka och skydda mot DDoS-attacker i applikationsskiktet. En metod för detta ändamål är att hitta avvikelser av olika typer hos de attackerande klienterna, för att urskilja mellan attackerande och vanliga klienter. Detta är ett brett utforskatförsvarsområde med många positiva resultat, men dessa metoder har ett antal brister, som att de kan resultera i både falska positiva och negativa resultat. En metod som
APA, Harvard, Vancouver, ISO, and other styles
4

Montes, Larios Jose Manuel, and Hernández Manuel Antonio Iturrizaga. "Diseño de arquitectura de seguridad perimetral para una empresa dedicada a la actividad inmobiliaria." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1285.

Full text
Abstract:
Debido a que el uso de Internet se encuentra en aumento, cada vez más compañías permiten a sus socios y proveedores acceder a sus sistemas de información. Por lo tanto, es fundamental saber qué recursos de la compañía necesitan protección para así controlar el acceso al sistema y los derechos de los usuarios del sistema de información. A su vez día a día se descubren nuevas vulnerabilidades, nuevos tipos de ataques y nuevos parches que aplicar los sistemas institucionales, convirtiendo la operación de la seguridad en una tarea sumamente compleja y demandante. El presente documento es sobre el
APA, Harvard, Vancouver, ISO, and other styles
5

Stéen, Alexandra. "Räck upp handen! Vem vill bli spottad i ansiktet på jobbet? : En rättsdogmatisk studie om polisens möjligheter till kränkningsersättning när de själva blir ett brottsoffer." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68921.

Full text
Abstract:
The Swedish police force is obligated to protect its citizens to maintain public order and to prevent and discover criminality in society. They work around the clock, every day throughout the year for the country’s security, freedom and democracy. But what happens when they themselves become victims of abuse and harassment, because of their job? The police are additionally protected by law when they are attacked in their uniform at work and this means an attack should be faced with punishment accordingly. The police force is a group in society who is more exposed to violence and who are traine
APA, Harvard, Vancouver, ISO, and other styles
6

Montoya, Maxime. "Sécurité adaptative et énergétiquement efficace dans l’Internet des Objets." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM032.

Full text
Abstract:
La sécurité des circuits intégrés pour l’IoT est généralement incompatible avec la faible consommation énergétique attendue de ces circuits. Cette thèse a donc pour but de proposer de nouvelles manières de concilier sécurité et efficacité énergétique pour les circuits intégrés.Dans un premier temps, la sécurisation d’un mécanisme de gestion de l’énergie est étudiée. Les radios de réveil permettent de gérer la sortie de veille d’objets connectés, en réveillant un tel objet lors de la réception d’un code de réveil spécifique, mais elles sont vulnérables aux attaques par déni de sommeil, qui cons
APA, Harvard, Vancouver, ISO, and other styles
7

Wei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>104<br>Software-defined networking (SDN) is a new network architecture with the central control. The purpose is to allow network to become more flexible and easier to manage. Besides, the need for the resources and services of applications can have better also management. SDN architecture is to separate the control plane and data plane. Control plane uses a controller to centrally manage SDN switch, while the data plane handles only data transmission, which can reduce the difficulty of management. SDN using OPENFLOW protocol to connect the control plane and data pl
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "UDP attacks"

1

Brownlow, Michael. Kraken attack! Macmillan Children's Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

ill, Carter David A., ed. Snack attack: A tasty pop-up book. Simon and Schuster Books for Young Readers, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morton, Robert. Sir Rutherford Alcock. Amsterdam University Press, 2024. https://doi.org/10.5117/9789463725293.

Full text
Abstract:
The son of a village doctor, Rutherford Alcock trained in medicine and became a battlefield surgeon, working in Portugal and Spain during the civil wars there in the 1830s. In a major career shift, he entered the consular service, went to China, and ended up as British Minister (the equivalent of today’s ambassador) to Japan and then China. This progression was unique, indeed bizarre, especially as every senior position he got was one he specifically said he did not want. Nonetheless, he was the man who commenced Britain’s relations with Japan and introduced Japan’s arts and crafts to the UK,
APA, Harvard, Vancouver, ISO, and other styles
4

Atkins, Stephen E. The 9/11 Encyclopedia [2 volumes]. Praeger, 2008. http://dx.doi.org/10.5040/9798216190325.

Full text
Abstract:
Horror. Sadness. Protests. Military action. Conspiracy theories. From personal loss to economic upheaval to a paradigm shift in U.S. foreign relations, few events in the past 100 years have impacted American life so greatly as the terrorist attacks of September 11, 2001. This comprehensive two-volume set details every event leading up to 9/11, going back up to a decade prior to the attacks, and including all participants from any place in the world. Also covered are events since the attack that have influenced our understanding of the ordeal. With A-Z entries, descriptive sidebars, and over 40
APA, Harvard, Vancouver, ISO, and other styles
5

Mickolus, Edward F., and Susan L. Simmons. Terrorism, 1996-2001. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216192497.

Full text
Abstract:
The most comprehensive source of global terrorist information is now up-to-date with the latest events, including the devastating attack of September 11, 2001, its aftermath, and the mysterious anthrax letters. This 2-volume set provides meticulous, comprehensive data on every international act of terrorism since 1996, including information on the terrorists and their victims, discussions of the judicial fate of the perpetrators, and details on governmental responses. This is the latest in Mickolus' series of chronologies dating back to 1960 and includes updated information on earlier terroris
APA, Harvard, Vancouver, ISO, and other styles
6

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems a
APA, Harvard, Vancouver, ISO, and other styles
7

Atkins, Stephen, ed. The 9/11 Encyclopedia. 2nd ed. ABC-CLIO, 2011. http://dx.doi.org/10.5040/9798400605918.

Full text
Abstract:
This work offers a sweeping collection of A–Z entries and primary source documents that presents a thorough examination of all the individuals, groups, and events surrounding the 9/11 terrorist attacks. Commemorating the 10th anniversary of the attacks on the World Trade Center and Pentagon,The 9/11 Encyclopedia: Second Editionoffers valuable perspective on this emotionally charged and multidimensional subject. This comprehensive two-volume encyclopedia details the events leading up to the attacks, going back a decade prior to 9/11, and covers all the major players involved. It also examines e
APA, Harvard, Vancouver, ISO, and other styles
8

Springer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.

Full text
Abstract:
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat—from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of Ch
APA, Harvard, Vancouver, ISO, and other styles
9

Kachun, Mitch. Michelle Obama, the Media Circus, and America’s Racial Obsession. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036606.003.0004.

Full text
Abstract:
This chapter shifts the focus to Michelle Obama, a figure whose family's experiences of enslavement, emancipation, and northward migration make her nearly as important a cultural figure as her husband. It explains how media coverage of Michelle Obama during the campaign was shaped not only by Americans' expectations of prospective first ladies, but by a long history of powerful stereotypes of black women and their bodies. While praised and admired by many, Michelle Obama had become a target whose attackers utilized an ever-expanding twenty-four/seven cable news cycle and the unprecedented foru
APA, Harvard, Vancouver, ISO, and other styles
10

Collins, John, and Tamara Dobler, eds. Reply to François Recanati. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198783916.003.0020.

Full text
Abstract:
In his present contribution François Recanati has said some very kind things about me and some very astute things about language. He recognizes something new and important which came into prominence, and enjoyed its heyday, at least in Anglophone philosophy, roughly in a post-war period stretching up to around Austin’s death in 1962. This was a period marked by a new sort of conception of what a philosophical question might be, and how one might coherently be formulated—of what philosophy ought to look like. He recognizes, too, those waiting in the wings to turn the clock back to a time of wha
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "UDP attacks"

1

Booth, Todd G., and Karl Andersson. "Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19210-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boro, Debojit, Himant Basumatary, Tribeni Goswami, and Dhruba K. Bhattacharyya. "UDP Flooding Attack Detection Using Information Metric Measure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Muthurajkumar, S., A. Geetha, S. Aravind, and H. Barakath Meharajnisa. "UDP Flooding Attack Detection Using Entropy in Software-Defined Networking." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3951-8_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ihsan, Zohair, Mohd Yazid Idris, Khalid Hussain, Deris Stiawan, and Khalid Mahmood Awan. "Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mohan, V., B. K. Madhavi, and S. B. Kishor. "Deep Neural Network Model for UDP SYN Flood Distributed DoS Attack Detection in SDN." In Learning and Analytics in Intelligent Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82706-8_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mopuri, Konda Reddy, Phani Krishna Uppala, and R. Venkatesh Babu. "Ask, Acquire, and Attack: Data-Free UAP Generation Using Class Impressions." In Computer Vision – ECCV 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01240-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dasari, Kishorebabu, and Srinivas Mekala. "UDP Flood DDoS Attack Detection Using Multilayer Perceptron Different Optimization Techniques with Pearson, Spearman and Kendall Uncorrelated Feature Subsets." In Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2742-5_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohan, V., B. K. Madhavi, and S. B. Kishor. "Detection of UDP SYN Flood DDoS Attack Using Random Forest Machine Learning Algorithm in a Simulated Software Defined Network." In ICT for Intelligent Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3982-4_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Huiwang, and Ya Li. "Query-UAP: Query-Efficient Universal Adversarial Perturbation for Large-Scale Person Re-Identification Attack." In Pattern Recognition and Computer Vision. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-18913-5_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Verma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch030.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "UDP attacks"

1

Romadhon, Faizal Wahyu, Muhammad Azza Ulin Nuha, Yusuf Adiprawira, and Riri Fitri Sari. "Comparative Analysis of HAProxy and Nginx Load Balancers in Mitigating User Datagram Protocol (UDP) Flood Attacks." In 2024 12th International Conference on Information and Communication Technology (ICoICT). IEEE, 2024. http://dx.doi.org/10.1109/icoict61617.2024.10698656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sachdeva, Rachneet, Haritz Puerto, Tim Baumgärtner, et al. "UKP-SQuARE v2: Explainability and Adversarial Attacks for Trustworthy QA." In Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing: System Demonstrations. Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.aacl-demo.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Yufei, Ziqi Zhou, Minghui Li, et al. "PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation." In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Menendez, C. M., V. Jovancicevic, S. Ramachandran, M. Morton, and D. Stegmann. "New Method for Assessing Corrosion under Iron Sulfide Deposits and CO2/H2S Conditions." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11265.

Full text
Abstract:
Abstract The presence of surface deposits, such as sand, iron sulfide or organic solids in oil and gas production systems can lead to premature failure of fluid-handling equipment. When corrosion occurs under solid deposition, the process of corrosion is often referred to as under-deposit corrosion (UDC). The UDC mechanism is dependent upon the local operating conditions, such as gas composition, conditions of fluid flow, and solid content of the fluids. In this work, a new monitoring method was developed to study the corrosion that occurs under a relatively thick layer of deposits. Iron sulfi
APA, Harvard, Vancouver, ISO, and other styles
5

Wei, Hung-Chuan, Yung-Hao Tung, and Chia-Mu Yu. "Counteracting UDP flooding attacks in SDN." In 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, 2016. http://dx.doi.org/10.1109/netsoft.2016.7502468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mutu, Laura, Rania Saleh, and Ashraf Matrawy. "Improved SDN responsiveness to UDP flood attacks." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, Daniel R., Richard Clayton, and Alastair R. Beresford. "1000 days of UDP amplification DDoS attacks." In 2017 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 2017. http://dx.doi.org/10.1109/ecrime.2017.7945057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biagioni, Edoardo. "Preventing UDP Flooding Amplification Attacks with Weak Authentication." In 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2019. http://dx.doi.org/10.1109/iccnc.2019.8685648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Junseok, Minhyeong Kim, Wonjun Song, Younghoon Kim, and Dohyung Kim. "Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks." In SAC '24: 39th ACM/SIGAPP Symposium on Applied Computing. ACM, 2024. http://dx.doi.org/10.1145/3605098.3635885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Walia, Rubika, and Prachi Garg. "Cryptography: Analysis of SYN and UDP Attacks using wire shark." In 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST). IEEE, 2021. http://dx.doi.org/10.1109/iccmst54943.2021.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "UDP attacks"

1

Jenkins, Brian, Bruce Butterworth, and Sachi Yagu. Evolving Patterns of Violence in Developing Countries. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2024.2344.

Full text
Abstract:
In August 2022, MTI issued a report entitled Changing Patterns of Violence Pose New Challenges to Public Surface Transportation in the United States. That report analyzed the frequency and lethality of attacks on public surface transport in economically advanced countries. But what has been going on in non-economically advanced countries – the vast majority of countries in the world? Using the MTI database of Terrorist and Serious Criminal Attacks Against Public Surface Transportation, the authors analyzed attacks against passenger trains and train stations, buses and bus stations and stops, a
APA, Harvard, Vancouver, ISO, and other styles
2

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under
APA, Harvard, Vancouver, ISO, and other styles
3

Kula, Gregory J. Assessing the Effects of Computer Network and Electronic Attack: Does Joint Doctrine Measure Up? Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada504932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report a
APA, Harvard, Vancouver, ISO, and other styles
5

Tanaka, Eri, Regina Schwerd, Wolfgang Hofbauer, and Daniel Zirkelbach. Laboratory tests on decay of natural fibre insulation materials suggest a more differentiated evaluation and higher RH thresholds. Department of the Built Environment, 2023. http://dx.doi.org/10.54337/aau541651346.

Full text
Abstract:
To reduce CO2 emissions and save grey energy, natural materials like wood and wooden materials are becoming more and more important. However, these products are particularly sensitive to moisture, as they can be attacked by mould or decay fungi. In contrast to mould growth, which typically is associated with visual impairment and health problems, the growth of decay fungi may result in structural defects which clearly must be excluded. Up to now it is mostly assumed that wooden materials are more sensitive to such attack than solid wood. Therefore, different wood fibre insulation materials wer
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Ruo-xiang, Xun Li, Jing Li, et al. Does Chinese herbal remedy Tangcao tablet work for the treatment of HIV/AIDS:a systematic review of controlled clinical trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.6.0042.

Full text
Abstract:
Review question / Objective: This study aims to evaluate the effectiveness and safety of Tangcao tablet (Tangcao) for treating people with HIV/AIDS. Condition being studied: Acquired immunodeficiency syndrome (AIDS) is a chronic infectious disease characterized by severe immunodeficiency caused by the human immunodeficiency virus (HIV). The infection attacks specifically the white blood cells, CD4+T (CD4) cells, weakening the immunity of individuals against infections such as tuberculosis. Without treatment, patients with AIDS may survive up to 2 years. Pneumocystis pneumonia and infections of
APA, Harvard, Vancouver, ISO, and other styles
7

Drury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.

Full text
Abstract:
Background: Public behaviour and the new hostile threats • Civil contingencies planning and preparedness for hostile threats requires accurate and up to date knowledge about how the public might behave in relation to such incidents. Inaccurate understandings of public behaviour can lead to dangerous and counterproductive practices and policies. • There is consistent evidence across both hostile threats and other kinds of emergencies and disasters that significant numbers of those affected give each other support, cooperate, and otherwise interact socially within the incident itself. • In emerg
APA, Harvard, Vancouver, ISO, and other styles
8

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-sou
APA, Harvard, Vancouver, ISO, and other styles
9

Erol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.

Full text
Abstract:
This paper presents a framework to study of technological resiliency of financial system architecture. Financial market infrastructures, or platforms, compete with services critical functions along various stages in the lifecycle of a trade, and make investments in technological resiliency to guard against attackers seeking to exploit system weaknesses. Platforms’ financial network effects attenuate competition between platforms on security. Exposure to vulnerabilities is magnified in the presence of strategic adversaries. Private provision of technological resiliency is generally sub-optimal,
APA, Harvard, Vancouver, ISO, and other styles
10

Lahti, Yannick, and Emilia Palonen. The impact of the Russia–Ukraine war on right-wing populism in Finland. European Center for Populism Studies (ECPS), 2023. http://dx.doi.org/10.55271/rp0018.

Full text
Abstract:
As Finland’s neighbour, Russia, attacked its neighbour, Ukraine, the response across the political spectrum in Finland was universal. All the parties underscored the importance of patriotism and sovereignty and messages of solidarity and support for Ukraine (alongside condemnation of Russia). Support for Putin or the war is basically non-existent in Finland. Still, the Finns Party (FP), which is part of the populist Radical Right milieu in Finland, polls extremely well. Moreover, groups combining anti-COVID-19 measures with pro-Putin leanings have registered as political parties in preparation
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!