UDP Flood Attack
The UDP abbreviation is an Internet protocol known as the User Datagram Protocol. This Protocol is in charge of communication in the network, similar to TCP. Unlike TCP, however, it does not use authentication to establish, run, and expire communication time. It is therefore much faster, but on the other hand also easy to exploit in an UDP Flood Attack.
This is performed by the attacker sending a large number of UDP packets to the random ports of the target server, which must respond to the packets. First, it will check whether these ports are tracking any of its applications. Once detected, it must answer the information that the target destination is inaccessible. The packet is sent by the ICMP Internet Protocol used to send error messages.
The server must, under the rules of communication, reply to every UDP packet it receives. If they receive a large amount and try to answer all of them, it exhausts their Internet connectivity and sometimes other means. The server is completely overloaded by the attack and any other communication becomes impossible.