udp_flood
Description
UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP flood attack involves sending a UDP packet to a random port on the target system. If enough UDP packets are delievered to the target system, the system will go down.
Due to the relative simplicity of the UDP, an attacker can produce large quantity of packets with relatively small effort.
Affected Products
Any unprotected system that is connected to the Internet is vulnerable to the UDP flood attack.
Impact
The target system may unable to provide services while under attack and for some time after the attack stops.
Recommended Actions
If a FortiGate with FortiOS 2.80 or above is used, select Clear Session as the default action for the signature.
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |