This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a DDoS vulnerability in CoAP protocols.
Constrained Application Protocol is susceptible to IPAddress spoofing and packet amplification that can lead to DDoS attacks.
- Various platforms supporting CoAP.