description-logoDescription

UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP flood attack involves sending a UDP packet to a random port on the target system. If enough UDP packets are delievered to the target system, the system will go down.


Due to the relative simplicity of the UDP, an attacker can produce large quantity of packets with relatively small effort.

affected-products-logoAffected Products

Any unprotected system that is connected to the Internet is vulnerable to the UDP flood attack.

Impact logoImpact

The target system may unable to provide services while under attack and for some time after the attack stops.

recomended-action-logoRecommended Actions

If a FortiGate with FortiOS 2.80 or above is used, select Clear Session as the default action for the signature.

Coverage

IPS (Regular DB)
IPS (Extended DB)

References

1