SpywareGuide powered by Actiance Security Labs
Search SpywareGuide Database & Site
Home Access the Guide
List of Products List of Companies List of Categories
Tools
X-RayPC
Terms and Definitions
 

UDP Flood

Class: Attack

A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless computer networking protocol.

Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will:

Check for the application listening at that port;
See that no application listens at that port;
Reply with an ICMP Destination Unreachable packet.
Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach him, and anonymizing the attacker's network location(s).

This attack can be managed by deploying firewalls at key points in a network to filter out unwanted network traffic. The potential victim never receives and responds to the malicious UDP packets because the firewall stops them.

Browse other terms

Recent Modifications
Notice: Undefined variable: incprefix in /data/www/spywareguide/term_show.php on line 144
2022-4-20  Adult Networks/Services
2017-2-10  Adult Hosts
2016-3-30  CoolWebSearch
2015-9-29  Malicious URLS
2015-5-19  Dialers
2015-1-5  Email Threats
2013-7-20  Date Manager
2013-4-10  BeeBus
2012-12-18  JT.Moonwalk
2012-12-18  Sadbiz
 
Company  | Site and Spyware FAQ
© Copyright 2003- Notice: Use of undefined constant Y - assumed 'Y' in /data/www/spywareguide/term_show.php on line 176 2022, Actiance, Inc. All rights reserved.   Privacy Policy