?
Solved

UDP flood attacks from certain Machines

Posted on 2016-09-15
4
Medium Priority
?
41 Views
Last Modified: 2016-10-01
Router shows some UDP flood attacks logs from certain machines. What are the things can check?
For chrome://net-internals/#quic , based on statistics which are the fields related to possibly on YouTube viewing?
0
Comment
Question by:grnow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 41802362
Can you define UDP flood somehow? Port numbers involved?
RTSP video stream can make such indication loggin choke.
0
 

Assisted Solution

by:grnow
grnow earned 0 total points
ID: 41811839
The udp flood attacks appear to come from those machines whereby users tend to view YouTube videos
0
 
LVL 62

Accepted Solution

by:
gheist earned 1500 total points
ID: 41811974
Flash uses RTSP over UDP to play videos. Though not much should be coming FROM your users machines.
0
 

Author Closing Comment

by:grnow
ID: 41824634
Looks like it's YouTube viewing causing a lot of UDP attacks
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month15 days, 4 hours left to enroll

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question