A UDP flood attack is a denial of service attack where an attacker overwhelms a targeted host with UDP packets. UDP is a connectionless protocol that does not require handshaking, allowing it to be used to launch attacks. While firewalls can filter unwanted traffic, they too can be overwhelmed. There are several ways to mitigate UDP flood attacks, such as rate limiting ICMP responses, firewall filtering, and filtering UDP packets except for DNS at the network level. Advanced mitigation techniques involve load balancing attacks across scrubbing servers using anycast technology and deep packet inspection to filter out malicious packets.