当前位置:网站首页>UDP flood attack defense principle
UDP flood attack defense principle
2022-06-26 11:02:00 【IDC02_ FEIYA】
UDP Flood Principles of attack and defense
One 、UDP Flood Attack principle
UDP Flood It is an increasingly rampant flow type DoS attack , The principle is also simple . It is common to use a large number of UDP Impact bag DNS Server or Radius Authentication server 、 Streaming video server . 100k pps Of UDP Flood Often break down the backbone equipment on the line, such as firewall , Cause the paralysis of the whole network segment . because UDP Protocol is a connectionless service , stay UDP FLOOD In attack , An attacker can send a large number of forged sources IP Small address UDP package . however , because UDP The protocol is connectionless , So just open one UDP If the port provides relevant services , Then you can attack related services .
In normal application ,UDP Packet traffic will be basically equal in both directions , And the size and content are random , Changed a lot . appear UDP Flood Under the circumstances , For the same goal IP Of UDP There are a lot of bags on one side , And the content and size are fixed .
Two 、UDP Flood defense
UDP Deal with the TCP Different agreements , Is a connectionless protocol , also UDP There are a variety of application protocols , It's very different , So for UDP Flood It's very difficult to protect . Its protection shall be treated according to specific conditions :
Determine package size , If it is a large packet attack, use prevention UDP Fragmentation method : Set the packet fragment reassembly size according to the attack packet size , Usually not less than 1500. In extreme cases , Consider discarding all UDP debris .
The attack port is the service port : According to the business UDP Maximum package length setting UDP Maximum packet size to filter abnormal traffic .
The attack port is a non service port : One is to discard all UDP package , May injure normal business ; One is to establish UDP Connection rules , It requires that all the... Going to this port UDP package , Must first be with TCP Port establishment TCP Connect . However, this method needs to be supported by a professional firewall or other protective equipment .
Hand in hand Chi net Explore together “ What cool things can you do with a server ?”
边栏推荐
- SQL Server foundation introduction collation
- laravel 安装报错 Uncaught ReflectionException: Class view does not exist
- SQL index learning notes
- AdaptiveAvgPool2D 不支持 onnx 导出,自定义一个类代替 AdaptiveAvgPool2D
- Matrix fast power notes
- Sqli-labs靶场1-5
- [software project management] sorting out knowledge points for final review
- 近期工作汇报
- 机器学习线性回归——实验报告
- 24 个必须掌握的数据库面试问题!
猜你喜欢
![[deep learning theory] (6) recurrent neural network RNN](/img/33/e270b08e7748a6e740eb618ed10c9a.gif)
[deep learning theory] (6) recurrent neural network RNN

Opencv image processing - grayscale processing

【深度学习理论】(7) 长短时记忆网络 LSTM

Sqli labs range 1-5

Using reflection to export entity data to excel

Getting started with postman

Unity使用SteamVRPlugin时如何不让其他Camera位置和旋转收到SteamVRPlugin控制

ACK攻击是什么意思?ACK攻击怎么防御?

9、 Beautify tables, forms, and hyperlinks

3、 Linked list exercise
随机推荐
Postman入门教程
Easyx-----c语言实现2048
【深度学习理论】(7) 长短时记忆网络 LSTM
Vscode environment setup: synchronous configuration
Using baijiafan to automatically generate API calls: progress in JS (II)
laravel-admin隐藏按钮, 及设置按钮显示, 默认序列, form 表单的不可修改值
MySQL 12th job - Application of stored procedure
Windows and Linux regularly backup MySQL database
互联网对抗神器之漏洞扫描与反渗透
8- creating leecode algorithm with pictures and texts - algorithm solution of minimum stack and LRU caching mechanism
UDP Flood攻击防御原理
Code specification & explain in detail the functions and uses of husky, prettier, eslint and lint staged
wangEditor 上传本地视频修改
Nuxt. JS - learning notes
4、 Stacks and queues
Developers, what is the microservice architecture?
2020.7.6 interview with fence network technology company
MySQL 9th job - connection Query & sub query
Oracle sqlplus query result display optimization
[work details] March 18, 2020