[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Understanding UDP Flood Attacks

Similar to the ICMP flood, UDP flooding occurs when an attacker sends IP packets containing UDP datagrams with the purpose of slowing down the victim to the point that the victim can no longer handle valid connections.

Before You Begin

For background information, read:

After enabling the UDP flood protection feature, you can set a threshold that, once exceeded, invokes the UDP flood attack protection feature. (The default threshold value is 1000 packets per second.) If the number of UDP datagrams from one or more sources to a single destination exceeds this threshold, JUNOS Software ignores further UDP datagrams to that destination for the remainder of that second plus the next second as well. See Figure 149.

Figure 149: UDP Flooding

Image UDP_flood.gif

Related Topics

[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]