After upgrading from 11.0.6 MP1 to 11.0.6 MP3, I started receiving many alerts about UDP Flood Attacks. Most of them are coming from external users, and mainly from home routers (192.168.x.x IPs), many of whom are connecting with VPN.
The exact message is
Denial of Service "UDP Flood Attack" attack detected. Description: An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.
|
I have tried loosening the alert notification conditions, but it still seems to happen very often.
I have recently updated to 11.0.7, which states that this problem has been specifically addressed, but as of several minutes ago, I have received two identical alerts from two different users/machines, both of them being on completely different home networks.
I have been following some threads on this, such as :
https://www-secure.symantec.com/connect/ideas/increase-denial-service-udp-flood-attack-threshold
and
https://www-secure.symantec.com/connect/forums/false-positive-dos-attack-udp-flood-attack-sep-ntp
They are helpful, but it seems they are labelled as "update to version X, as it is fixed", but it still seems to be a problem.
Adding exclusions for all the various external users is not a viable option, as we have users that work from home, travel, etc. so their source IPs are never static, nor would we want to open up ourselves to that kind of trouble.
Any help would be great.
Any further information I can provide, I would be glad to do so.
Thanks,
-Nate