Solved

UDP flood attacks from certain Machines

Posted on 2016-09-15
4
32 Views
Last Modified: 2016-10-01
Router shows some UDP flood attacks logs from certain machines. What are the things can check?
For chrome://net-internals/#quic , based on statistics which are the fields related to possibly on YouTube viewing?
0
Comment
Question by:grnow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 41802362
Can you define UDP flood somehow? Port numbers involved?
RTSP video stream can make such indication loggin choke.
0
 

Assisted Solution

by:grnow
grnow earned 0 total points
ID: 41811839
The udp flood attacks appear to come from those machines whereby users tend to view YouTube videos
0
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 41811974
Flash uses RTSP over UDP to play videos. Though not much should be coming FROM your users machines.
0
 

Author Closing Comment

by:grnow
ID: 41824634
Looks like it's YouTube viewing causing a lot of UDP attacks
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question