Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1188

UDP

What is UDP?

UDPA connectionless transport protocol (RFC 768) that delivers individual datagrams between ports with minimal overhead but no reliability or ordering guarantees.


The User Datagram Protocol, defined in RFC 768, is a thin layer above IP that adds only source/destination ports, length, and an optional checksum. There is no handshake, no retransmission, no flow control, and no congestion control — each datagram is independent. This makes UDP ideal for latency-sensitive or one-shot workloads such as DNS, NTP, SNMP, VoIP, video streaming, and the QUIC transport that underpins HTTP/3. The lack of state also makes UDP a frequent vehicle for amplification attacks: spoofed-source packets to DNS, NTP, or memcached servers cause large reflected responses. Defenses include rate limiting, BCP 38 ingress filtering, and protocol-level cookies.

Examples

  1. 01

    A DNS resolver sends a 60-byte query on UDP port 53 and receives a single-packet answer.

  2. 02

    HTTP/3 carries web traffic over QUIC, which runs on UDP port 443 instead of TCP.

Frequently asked questions

What is UDP?

A connectionless transport protocol (RFC 768) that delivers individual datagrams between ports with minimal overhead but no reliability or ordering guarantees. It belongs to the Network Security category of cybersecurity.

What does UDP mean?

A connectionless transport protocol (RFC 768) that delivers individual datagrams between ports with minimal overhead but no reliability or ordering guarantees.

How does UDP work?

The User Datagram Protocol, defined in RFC 768, is a thin layer above IP that adds only source/destination ports, length, and an optional checksum. There is no handshake, no retransmission, no flow control, and no congestion control — each datagram is independent. This makes UDP ideal for latency-sensitive or one-shot workloads such as DNS, NTP, SNMP, VoIP, video streaming, and the QUIC transport that underpins HTTP/3. The lack of state also makes UDP a frequent vehicle for amplification attacks: spoofed-source packets to DNS, NTP, or memcached servers cause large reflected responses. Defenses include rate limiting, BCP 38 ingress filtering, and protocol-level cookies.

How do you defend against UDP?

Defences for UDP typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for UDP?

Common alternative names include: User Datagram Protocol.

Related terms

See also