<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP flood attack detected in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965743#M416719</link>
    <description>Thank you</description>
    <pubDate>Thu, 09 Mar 2006 20:04:10 GMT</pubDate>
    <dc:creator>ckchan</dc:creator>
    <dc:date>2006-03-09T20:04:10Z</dc:date>
    <item>
      <title>UDP flood attack detected</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965739#M416715</link>
      <description>Hello there,&lt;BR /&gt;My firewall monitoring tool keeps receiving "UDP flood attack detected" from one of our servers. Please advise what should i do&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;</description>
      <pubDate>Wed, 08 Mar 2006 21:08:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965739#M416715</guid>
      <dc:creator>ckchan</dc:creator>
      <dc:date>2006-03-08T21:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: UDP flood attack detected</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965740#M416716</link>
      <description>Your question doesn't make it clear if your server is the source of these packets or is the victim. In any event, the firewall should be able to identify the port number(s), the IP address(es), and the MAC address(es) of the sending host(s). The first few hex digits of the MAC address can help you identify the type of equipment if the IP addresses are unknown. &lt;BR /&gt;&lt;BR /&gt;This sounds like you have some infected PC's on your network but you simply haven't provided enough data yet.</description>
      <pubDate>Wed, 08 Mar 2006 21:50:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965740#M416716</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-03-08T21:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: UDP flood attack detected</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965741#M416717</link>
      <description>Thanks for your response&lt;BR /&gt;The server is the source of the packet. How do i know the root cause?</description>
      <pubDate>Wed, 08 Mar 2006 22:48:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965741#M416717</guid>
      <dc:creator>ckchan</dc:creator>
      <dc:date>2006-03-08T22:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: UDP flood attack detected</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965742#M416718</link>
      <description>The answer is the same. The firewall should have logged the offending port number. You then need to find what process is using that port.</description>
      <pubDate>Wed, 08 Mar 2006 23:55:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965742#M416718</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-03-08T23:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: UDP flood attack detected</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965743#M416719</link>
      <description>Thank you</description>
      <pubDate>Thu, 09 Mar 2006 20:04:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/udp-flood-attack-detected/m-p/4965743#M416719</guid>
      <dc:creator>ckchan</dc:creator>
      <dc:date>2006-03-09T20:04:10Z</dc:date>
    </item>
  </channel>
</rss>

