// API callback
myrecent({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189"},"updated":{"$t":"2022-11-11T07:03:14.320-08:00"},"category":[{"term":"News"},{"term":"DDoS Attacks"},{"term":"DDoS Mitigation"},{"term":"DDoS Protection"},{"term":"Vulnerabilities"},{"term":"Online Games"},{"term":"UDP Attack Scripts"},{"term":"UDP DDoS Attacks"},{"term":"UDP Games"},{"term":"WordPress"},{"term":"featured"}],"title":{"type":"text","$t":"Hyperfilter DDoS Protection Solutions Blog"},"subtitle":{"type":"html","$t":"Hyperfilter DDoS Protection Solutions Blog"},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/-\/DDoS+Protection?alt=json-in-script\u0026max-results=1"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/search\/label\/DDoS%20Protection"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"},{"rel":"next","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/-\/DDoS+Protection\/-\/DDoS+Protection?alt=json-in-script\u0026start-index=2\u0026max-results=1"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"2"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"1"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189.post-5904175111400936715"},"published":{"$t":"2016-09-05T20:39:00.003-07:00"},"updated":{"$t":"2016-09-06T18:29:50.461-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Mitigation"},{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Protection"},{"scheme":"http://www.blogger.com/atom/ns#","term":"featured"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Online Games"},{"scheme":"http://www.blogger.com/atom/ns#","term":"UDP Attack Scripts"},{"scheme":"http://www.blogger.com/atom/ns#","term":"UDP DDoS Attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"UDP Games"}],"title":{"type":"text","$t":"UDP - DDoS Protection"},"content":{"type":"html","$t":"\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/1.bp.blogspot.com\/-CWbwgoaOb2A\/V846PM4KQAI\/AAAAAAAAAGs\/Z-6pfr79Woo1lYaP8yW7PgRJ_Aab4yJFwCLcB\/s1600\/Udp1.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"161\" src=\"https:\/\/1.bp.blogspot.com\/-CWbwgoaOb2A\/V846PM4KQAI\/AAAAAAAAAGs\/Z-6pfr79Woo1lYaP8yW7PgRJ_Aab4yJFwCLcB\/s200\/Udp1.jpg\" width=\"200\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cbr \/\u003EIt is common knowledge that nowadays many developing companies, game publishers or even independent developers tends to choose \u003Cb\u003EUDP Protocol\u003C\/b\u003E as their standard for their internet driven applications.\u003Cbr \/\u003E\u003Cbr \/\u003EAlthough, compared with the \u003Cb\u003ETCP Protocol\u003C\/b\u003E, the \u003Cb\u003EUDP Protocol\u003C\/b\u003E does have its advantages and disadvantages, and we can (to enlighten the readers), enumerate a few of them here:\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cb\u003EKey Advantages:\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Col\u003E\u003Cli\u003E- \u003Cb\u003ELow latency\u003C\/b\u003E between data exchange in both endpoints (server \/ client).\u003C\/li\u003E\u003Cli\u003E- \u003Cb\u003EHigh flexibility\u003C\/b\u003E in protocol development.\u003C\/li\u003E\u003Cli\u003E- \u003Cb\u003EConnection less\u003C\/b\u003E protocol, direct data exchange between both endpoints (server \/ client).\u003C\/li\u003E\u003Cli\u003E- Perfect for \u003Cb\u003Evoice\/video streaming\u003C\/b\u003E based applications, or \u003Cb\u003Elatency sensitive games\u003C\/b\u003E (generally FPS in most cases).\u003C\/li\u003E\u003C\/ol\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cb\u003EKey Disadvantages:\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Col\u003E\u003Cli\u003E- Since it is a connection less protocol, there is \u003Cb\u003Eno session validation\u003C\/b\u003E between connections, it means at any time one may start data transmission without passing through a handshake algorithm like TCP.\u003C\/li\u003E\u003Cli\u003E- \u003Cb\u003ENo packet ordering\u003C\/b\u003E guaranteed, this must be implemented and handled by the developer itself, while in TCP this is a mature feature, ensuring all packets are received in the same order as they have originated from the source.\u003C\/li\u003E\u003Cli\u003E- \u003Cb\u003E\u003Cspan style=\"color: red;\"\u003EVulnerabilities of all types\u003C\/span\u003E\u003C\/b\u003E when it comes to \u003Cb\u003EDDoS Attacks\u003C\/b\u003E, either by the written applications acting as amplification vector for DDoS Attacks or being a target from these vectors (Such as DNS Amplification, NTP Amplification, Chargen Amplification, SNMP Amplification and much more, as there are dozens of vulnerable computers on the internet, ready to be used as amplification vectors). Also, still on this subject, these applications are often target of customized attacks, coded targeting the application in order to either cause resource exhaustion at the server-side or even a complete downtime. It is important to say, that while TCP adds a response time overhead in it's packet transmissions, it is much safer than UDP in these matters, due to the protocol design itself, removing this responsibility from the developers back.\u003C\/li\u003E\u003C\/ol\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cb\u003EAn example of a customized\/scripted UDP DDoS Attack towards a TeamSpeak voice server:\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/3.bp.blogspot.com\/-YD_zqgplv4M\/V84_coRI6NI\/AAAAAAAAAG4\/hP6gz7b6EN4974uTXm-uaxbCQKgoX_x9ACLcB\/s1600\/UDP-TS-Attack.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"https:\/\/3.bp.blogspot.com\/-YD_zqgplv4M\/V84_coRI6NI\/AAAAAAAAAG4\/hP6gz7b6EN4974uTXm-uaxbCQKgoX_x9ACLcB\/s1600\/UDP-TS-Attack.png\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cb\u003EThe solution:\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr \/\u003ENowadays, we (\u003Ca href=\"https:\/\/www.hyperfilter.com\/\" target=\"_blank\"\u003EHyperFilter\u003C\/a\u003E), are working in our own DDoS Appliances, focused in \u003Cb\u003Ehelping the developers\u003C\/b\u003E which depends\/require of the usage of UDP Protocol based applications. We're capable in conjunction with them, to \u003Cb\u003Eadd behavior detection techniques\u003C\/b\u003E in the middle of the communication and \"identify\" and \"separate\" the real user traffic, from forged\/spoofed custom attacks, keeping their applications stable.\u003Cbr \/\u003E\u003Cbr \/\u003EIf you are running in troubles with UDP based DDoS Attacks, we are open to discuss with you, implementation plans, to improve and solve these issues in your corporation, keeping your business project rock solid, while you \u003Cb\u003Efocus in the real objective\u003C\/b\u003E, which is your business by itself. :)\u003Cbr \/\u003E\u003Cbr \/\u003EOur engineering support team will always be \u003Cb\u003Elooking forward to help you\u003C\/b\u003E in any sort issues you may incur related to these types of attacks."},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/5904175111400936715\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2016\/09\/udp-ddos-protection.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/5904175111400936715"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/5904175111400936715"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2016\/09\/udp-ddos-protection.html","title":"UDP - DDoS Protection"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/1.bp.blogspot.com\/-CWbwgoaOb2A\/V846PM4KQAI\/AAAAAAAAAGs\/Z-6pfr79Woo1lYaP8yW7PgRJ_Aab4yJFwCLcB\/s72-c\/Udp1.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}}]}});