Sunteți pe pagina 1din 11

USER DATAGRAM

PROTOCOL (UDP)
NETWORK COMPONENTS AND
MONITORING
BYOUNGCHEOL JEONG
JOHN MALTO
JUNE 15, 2017
OUTLINE

• What is UDP?
• How UDP work?
• How it work with other protocol?
• Which layer of TCP/IP or OSI model?
• Network Security Implications
• Security Issues
WHAT IS UDP?
• Stands for User Datagram
Protocol
DNS, NTP
• No Guarantee of delivery Simple TFTP, IP
Fast Tunneling
• No Ordering IPTV
• No Duplication Broadca VoIP,
st Online
• No Congestion control Game

• Lightweight : Simple and


Fast(minimum mechanism)
• Broadcast : One Way
HOW DOES UDP WORK?
• UDP Header

• Source Port(2Byte) : 16 bit port number (0~65,535)


• Destination Port(2Byte) : 16 bit port number
• Length : 16 bit count of octets
• Checksum : Error Checking
HOW DOES UDP WORK?

Encapsulation: The destination IP and port number are


encapsulated in UDP packet.
① Write a letter : Making a Data in header
② Address the envelope : Receive IP address and
port number
③ Put return address : Sender IP address and port
number
DOES IT WORK WITH ANY OTHER
PROTOCOLS?

• Domain Name System (DNS)


• Voice over IP (VoIP)
• Routing Information Protocol (RIP)
• Trivial File Transfer Protocol (TFTP)
• Dynamic Host Configuration Protocol
(DHCP)
WHAT LAYER OF THE TCP/IP OR OSI
MODEL DOES IT OPERATE ON?
• Transport Layer
TCP/IP Protocols and Services OSI
Model Model
Applicatio HTTP FTP Applicatio
n n
Telnet DNS Presentati
on
SNMP POP Session
Transport TCP UDP Transport
Network ARP IP ICMP Network
Network Ethernet Data Link
DOES THE PROTOCOL HAVE ANY
NETWORK SECURITY IMPLICATIONS?

• No communication security
• Vulnerable to attacks such as
eavesdropping, spoofing, tampering,
DDOS, and sniffing.
• Easy to spoof because it is connectionless
ARE THERE ANY SECURITY ISSUES? IF
SO, CAN THEY BE RESOLVED?

• Encryption (e.g. Diffie–Hellman key exchange)


• Enable checksum property to check for
corrupted data
• Datagram Transport Layer Security (DTLS) is
designed to prevent attacks such as forgery,
tampering, and eavesdropping
REFERENCES USED:
• http://www.erg.abdn.ac.uk/users/Gorry/course/inet-
pages/udp.html
• https://www.lifewire.com/user-datagram-protocol-817976
• https://en.wikipedia.org/wiki/User_Datagram_Protocol
• http://searchmicroservices.techtarget.com/definition/UDP-User-
Datagram-Protocol
• https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Securi
ty
• http://searchnetworking.techtarget.com/answer/Are-there-any-
inherent-security-problems-with-UDP
THANK YOU !

S-ar putea să vă placă și