当前位置:网站首页>What does UDP attack mean? UDP attack prevention measures
What does UDP attack mean? UDP attack prevention measures
2022-07-06 06:55:00 【IDC02_ FEIYA】
UDP What does attack mean ?UDP Attack precautions
UDP What does attack mean ?
UDP Flood attack is a kind of host based denial of service attack . User datagram protocol (UDP) It's a connectionless protocol , It does not require any program to establish a connection to transmit data . When a packet passes UDP When the protocol is sent , The sending parties do not need to establish a connection through three handshakes , The receiver must receive and process the packet . Therefore, a large number of them are sent to the victim host UDP Packets can saturate the network .
together UDP Torrent attack ,UDP The message is sent to the random or designated port of the victim system . Usually ,UDP The flood attack is set as a random port pointing to the target . This makes the victim system must analyze the incoming data to determine which application service requested the data . If the victim system is being attacked , The service is not running , It will use ICMP The message responds to a “ The destination port is unreachable ” news .
Usually , In attack DDOS The tool will forge the source of the attack package IP Address . This helps hide the identity of the agent , At the same time, it can ensure that the response message from the victim host will not be returned to the agent .UDP Flood attack will also jam the network bandwidth around the victim host ( It depends on the network architecture and line speed ). therefore , Sometimes the host connected to the surrounding network of the victim system will also encounter network connection problems . If enough messages are sent to the victim's computer port UDP Data packets , The whole system will go down .
This is also why many game developers choose to seal when renting servers UDP The reason why the .
UDP Attack precautions
To ensure network security , Using firewall to filter harmful data from unknown sources can effectively reduce UDP Torrent attack . in addition , The following measures can also be taken :
1、 Disable or filter monitoring and response services .
2、 Disable or filter other UDP service .
3、 If the user must provide some UDP External access to services , Proxy mechanisms can be used to protect Services , So that it will not be abused .
4、 Monitor the user's network to know which systems are using these services , And monitor the signs of abuse .
Thank you for reading , Pay attention and don't get lost ~
边栏推荐
- Brief introduction to the curriculum differences of colleges and universities at different levels of machine human major -ros1/ros2-
- Leetcode daily question (1870. minimum speed to arrive on time)
- SAP SD发货流程中托盘的管理
- SSO流程分析
- PCL realizes frame selection and clipping point cloud
- 一文读懂简单查询代价估算
- Data security -- 13 -- data security lifecycle management
- RichView TRVStyle 模板样式的设置与使用
- Blue Bridge Cup zero Foundation National Championship - day 20
- AttributeError: Can‘t get attribute ‘SPPF‘ on <module ‘models.common‘ from ‘/home/yolov5/models/comm
猜你喜欢
Misc of BUU (update from time to time)
On the first day of clock in, click to open a surprise, and the switch statement is explained in detail
Cif10 actual combat (resnet18)
机器学习植物叶片识别
Map of mL: Based on the adult census income two classification prediction data set (whether the predicted annual income exceeds 50K), use the map value to realize the interpretable case of xgboost mod
这个高颜值的开源第三方网易云音乐播放器你值得拥有
[daily question] 729 My schedule I
BUU的MISC(不定时更新)
Visitor tweets about how you can layout the metauniverse
Facebook AI & Oxford proposed a video transformer with "track attention" to perform SOTA in video action recognition tasks
随机推荐
PCL realizes frame selection and clipping point cloud
Day 245/300 JS foreach data cannot be updated to the object after multi-layer nesting
Is it difficult for girls to learn software testing? The threshold for entry is low, and learning is relatively simple
pymongo获取一列数据
Attributeerror successfully resolved: can only use cat accessor with a ‘category‘ dtype
基于PyTorch和Fast RCNN快速实现目标识别
hydra常用命令
Reflex WMS中阶系列3:显示已发货可换组
【Hot100】739. Daily temperature
Every API has its foundation when a building rises from the ground
Market segmentation of supermarket customers based on purchase behavior data (RFM model)
Day 239/300 注册密码长度为8~14个字母数字以及标点符号至少包含2种校验
Bitcoinwin (BCW): the lending platform Celsius conceals losses of 35000 eth or insolvency
26岁从财务转行软件测试,4年沉淀我已经是25k的测开工程师...
Apache DolphinScheduler源码分析(超详细)
Number of query fields
[ 英語 ] 語法重塑 之 動詞分類 —— 英語兔學習筆記(2)
GET 和 POST 请求类型的区别
攻防世界 MISC中reverseMe简述
librosa音频处理教程