Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP).
As a result, the distant host will: Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients.
Most operating systems mitigate this part of the attack by limiting the rate at which ICMP responses are sent.
UDP Flood Attack Tools: This attack can be managed by deploying firewalls at key points in a network to filter out unwanted network traffic.
The potential victim never receives and never responds to the malicious UDP packets because the firewall stops them.