I have a Windows 2008 dedicated server which runs a server daemon for the video game "Renegade". This daemon has a serious flaw, any large quantity of any size UDP packets will cause it to crash. Lately I have been experiencing serious problems with this, as one small computer can use a simple perl script to send several small (2-byte) packets to the server on port 5000 and crash it, in spite of the actual dedicated box being unaffected.
I have searched for the best solution for this, and the only thing I can come up with is to create a Snort rule using rate limiting to drop packets from an IP that has been sending a large number of them in a short time, however Snot is a bit difficult to learn.
I was hoping someone here might be able to provide me with a Snort rule to accomplish this, or perhaps another alternative to keep the server from crashing under this load. It must be run on Windows and cannot be moved to Linux, where iptables would offer a simple solution.