翻訳と辞書
Words near each other
・ Udora (band)
・ Udora, Ontario
・ Udorn Duangdecha
・ Udorn Pimpak
・ Udorn Royal Thai Air Force Base
・ Udorpie
・ Udorsky District
・ Udot
・ Udot (island)
・ Udotea
・ Udoteaceae
・ Udovice
・ Udovo
・ Udowita
・ UDP
UDP flood attack
・ UDP glucuronosyltransferase 1 family, polypeptide A1
・ UDP Helper Address
・ UDP hole punching
・ UDP tracker
・ UDP Unicorn
・ UDP-2,3-diacetamido-2,3-dideoxyglucuronic acid 2-epimerase
・ UDP-2,3-diacylglucosamine diphosphatase
・ UDP-2,4-diacetamido-2,4,6-trideoxy-beta-L-altropyranose hydrolase
・ UDP-2-acetamido-2-deoxy-ribo-hexuluronate aminotransferase
・ UDP-2-acetamido-3-amino-2,3-dideoxy-glucuronate N-acetyltransferase
・ UDP-2-acetamido-4-amino-2,4,6-trideoxyglucose transaminase
・ UDP-3-O-(3-hydroxymyristoyl)glucosamine N-acyltransferase
・ UDP-3-O-acyl-N-acetylglucosamine deacetylase
・ UDP-3-O-N-acetylglucosamine deacetylase


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

UDP flood attack : ウィキペディア英語版
UDP flood attack

A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.
Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will:
* Check for the application listening at that port;
* See that no application listens at that port;
* Reply with an ICMP Destination Unreachable packet.
Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker(s) may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach them, and anonymizing their network location(s). Most operating systems mitigate this part of the attack by limiting the rate at which ICMP responses are sent.
Software such as Low Orbit Ion Cannon and UDP Unicorn can be used to perform UDP flooding attacks.
This attack can be managed by deploying firewalls at key points in a network to filter out unwanted network traffic. The potential victim never receives and never responds to the malicious UDP packets because the firewall stops them, however as Firewalls are 'stateful' ie can only hold a number of sessions, Firewalls can also be susceptible to flood attacks.
==External links==

* (CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack )

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「UDP flood attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.