1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Constrained Application Protocol DDoS

Attack: Constrained Application Protocol DDoS

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a DDoS vulnerability in CoAP protocols.

Additional Information

Constrained Application Protocol is susceptible to IPAddress spoofing and packet amplification that can lead to DDoS attacks.


  • Various platforms supporting CoAP.


  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube