ZyXEL Communications ZYWALL 1050 - V2.00 EDITION 1 User Manual page 450

Internet security gateway
Table of Contents

Advertisement

Chapter 30 ADP
30.8.2.5 UDP Flood Attack
UDP is a connection-less protocol and it does not require any connection setup procedure to
transfer data. A UDP flood attack is possible when an attacker sends a UDP packet to a
random port on the victim system. When the victim system receives a UDP packet, it will
determine what application is waiting on the destination port. When it realizes that there is no
application that is waiting on the port, it will generate an ICMP packet of destination
unreachable to the forged source address. If enough UDP packets are delivered to ports on
victim, the system will go down.
450
ZyWALL 1050 User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 1050

Table of Contents