What a UDP flood looks like in tcpdump
I set up a small lab to generate a UDP flood against my own honeypot, and watched it with tcpdump. The signature is distinctive once you have seen it. A walk through the patterns.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged udp — 1 result.
I set up a small lab to generate a UDP flood against my own honeypot, and watched it with tcpdump. The signature is distinctive once you have seen it. A walk through the patterns.