home » Archive » Networking

Networkers Palace

..::Request Time Out::..




UDP flood


E-mail this post



Remember me (?)



All personal information that you provide here will be governed by the Privacy Policy of Blogger.com. More...



So in the few last days, my network have been attacked by some malicious unresponsible person. The attack that attempted was what it may called "UDP Flood Attact". The main behaviour of this kind of attack is sending so many (the size may vary in their order) UDP packet rapidly.

Read More...



UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP Flood Attack is possible when an attacker sends a UDP packet to a random port on the victim system. When the victim system receives a UDP packet, it will determine what application is waiting on the destination port. When it realizes that there is no application that is waiting on the port, it will generate an ICMP packet of destination unreachable to the forged source address. If enough UDP packets are delivered to ports on victim, the system will go down.



So it will be quietly clear, that the attacker doesn't need to have a some related connection to our server, all he have to do just, determine the port..

uh GTG, i'll finished it later okay...




Post a Comment

Author

Previous posts

Archives

Friends

Contributors

Powered by Blogger

make money online blogger templates

my ATOM 0.3

Shout Me !! Photobucket - Video and Image Hosting

outdoor furniture