UDP flood attack

UDP flood attack

A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.

Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will:

* Check for the application listening at that port;
* See that no application listens at that port;
* Reply with an ICMP Destination Unreachable packet.

Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach him, and anonymizing the attacker's network location(s).

This attack can be managed by deploying firewalls at key points in a network to filter out unwanted network traffic. The potential victim never receives and never responds to the malicious UDP packets because the firewall stops them.

External links

* [http://www.cert.org/advisories/CA-1996-01.html CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Tribe Flood Network — The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf attack. First TFN initiated attacks are described in CERT [http://www.cert.org/incident notes/IN 99 04 …   Wikipedia

  • User Datagram Protocol — (UDP) is one of the core protocols of the Internet Protocol Suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal… …   Wikipedia

  • Comparison of operating system kernels — A kernel is the core component of every computer operating system. While kernels are highly technical in nature, and may be hidden from the user under many layers of software and applications, they do have distinguishing or characteristic… …   Wikipedia

  • Stacheldraht — (German for barbed wire) is a piece of software written by Random for Linux and Solaris systems which acts as a distributed denial of service (DDoS) agent. The tool detects and automatically enables source address forgery.Stacheldraht uses a… …   Wikipedia

  • Attaque par déni de service — Une attaque par déni de service (denial of service attack, d où l abréviation DoS) est une attaque ayant pour but de rendre indisponible un service, d empêcher les utilisateurs légitimes d un service de l utiliser. Il peut s agir de :… …   Wikipédia en Français

  • Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …   Wikipedia

  • Tanzania — Tanzanian, n., adj. /tan zeuh nee euh/; Swahili. /tahn zah nee ah/, n. a republic in E Africa formed in 1964 by the merger of the republic of Tanganyika and the former island sultanate of Zanzibar (including Pemba and adjacent small islands).… …   Universalium

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • WkD Bot — is a Trojan horse that was created in 2001 by a script kiddie using the nickname Wicked (born March 1988). It is a tool used to DDoS persons, servers or websites. Recent insights have revealed that WkD Bot was only an editor to hexedit the… …   Wikipedia

  • Stateful firewall — In computing, a stateful firewall (any firewall that performs stateful packet inspection (SPI) or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”