UDP flooding occurs when an attacker sends IP packets containing
UDP datagrams with the purpose of slowing down the victim to the
point that it can no longer handle valid connections. With the
UDP flood protection feature enabled, a threshold can be set which
once exceeded, the system invokes the UDP flood attack protection
feature.
The default threshold value is 1000 packets per second.
If the number of UDP datagrams from one or more sources to a
single destination exceeds this threshold, security device
ignores further UDP datagrams to that destination for the
remainder of that second plus the next second as well.
This attribute records the UDP flood attack packets.