Smurf attack

smurffragglefraggle attacksmurf amplifier
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.wikipedia
30 Related Articles

Denial-of-service attack

denial of servicedistributed denial of serviceDDoS
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.
Some common examples of DDoS attacks are fraggle, smurf, and SYN flooding.

Internet Control Message Protocol

ICMP11 - Time Exceededcontrol packet
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.
Smurf attack

Tribe Flood Network

The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf attack.

Dennis Moran (computer criminal)

Dennis Moran
On February 7, 2000, a smurf attack generating over 1 gigabit per second of ICMP traffic was launched against Yahoo!'s routers, causing their websites to be inaccessible to the world for hours.

Broadcast radiation

broadcast stormbroadcast storms
In some cases, a broadcast storm can be instigated for the purpose of a denial of service (DOS) using one of the packet amplification attacks, such as the smurf attack or fraggle attack, where smurf sends a large amount of ICMP Echo Requests (ping) traffic to a broadcast address, with each ICMP Echo packet containing the spoof source address of the victim host.

Wake-on-LAN

WoLwake-up-packetLAN
When preparing a network to forward SDB packets, care must be taken to filter packets so that only desired (e.g. WoL) SDB packets are permitted — otherwise the network may become a participant in DDoS attacks such as the Smurf Attack.

BlackNurse

Unlike previous attacks using the ICMP protocol--Smurf Attack, Ping flood, Ping of death--BlackNurse does not flood the destination with traffic.

Stacheldraht

Stacheldraht uses a number of different denial-of-service (DoS) attacks, including User Datagram Protocol (UDP) flood, Internet Control Message Protocol (ICMP) flood, Transmission Control Protocol (TCP) SYN flood and Smurf attack.

List of eponyms (L–Z)

The Smurfs, Belgian comics characters - Smurf (Smurf language), Smurf attack, Smurfing.

Smurf Amplifier Registry

The Smurf Amplifier Registry is a blacklist of networks on the Internet which have been misconfigured in such a way that they can be used as smurf amplifiers for smurf denial of service attacks.

Broadcasting (networking)

broadcastbroadcastingbroadcasts
Broadcasting may be abused to perform a type of DoS-attack known as a Smurf attack.

IRC flood

IP address spoofing

spoofedspoofingIP address
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

Computer network

networknetworkingcomputer networking
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

Broadcast address

broadcastbroadcastsIP broadcast
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

The Smurfs

SmurfSmurfsby the same name
The name comes from the idea of very small, but numerous attackers overwhelming a much larger opponent (see Smurfs).

Ingress filtering

filter users by IP addressingressnetwork ingress filtering
Another proposed solution is network ingress filtering, which rejects the attacking packets on the basis of the forged source address.