Contact sales: +420 226 801 710
  • cs
  • en

UDP Flood Attack

 

 

The UDP abbreviation is an Internet protocol known as the User Datagram Protocol. This Protocol is in charge of communication in the network, similar to TCP. Unlike TCP, however, it does not use authentication to establish, run, and expire communication time. It is therefore much faster, but on the other hand also easy to exploit in an UDP Flood Attack.

This is performed by the attacker sending a large number of UDP packets to the random ports of the target server, which must respond to the packets. First, it will check whether these ports are tracking any of its applications. Once detected, it must answer the information that the target destination is inaccessible. The packet is sent by the ICMP Internet Protocol used to send error messages.

The server must, under the rules of communication, reply to every UDP packet it receives. If they receive a large amount and try to answer all of them, it exhausts their Internet connectivity and sometimes other means. The server is completely overloaded by the attack and any other communication becomes impossible.

Is your website protected against an DDoS attack?

Consult the possibilities of protecting against DDoS attacks with our specialists. We will propose to you the most suitable solution that will fully meet your needs.

Is your website protected against an DDoS attack?

Consult the possibilities of protecting against DDoS attacks with our specialists. We will propose to you the most suitable solution that will fully meet your needs.

system_white