Resources Banner

Glossary - N

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 

Non-Spoofed UDP Flood

During this attack, a victim server receives non-spoofed UDP packets at a very high packet rate and is overwhelmed by the large amount of incoming UDP packets. The attack consumes network resources and available bandwidth, exhausting the network until it shuts down. In Non-Spoofed UDP Flood packets, the source IP is the actual public IP of the attacker BOT, and the source IP range is equal to the number of BOTs used in the attack. This type of attack is harder to identify because it resembles good traffic.