UDP Flood is a denial-of-service attack that uses the connectionless UDP transport protocol and attempts to send large numbers of packets to random UDP protocol ports on a remote system, or to a specific protocol. UDP flood is a reflection attack that is often used for attacking DNS servers operating on UDP port 53. UDP flooding typically uses IP spoofing, in which the sender address is faked. The purpose is to occupy so many resources on the target that it can no longer provide its services on the network.
This page has no comments.