![]() ![]() The name comes from the idea of very small, but numerous attackers overwhelming a much larger opponent (see Smurfs). In the late 1990s, many IP networks would participate in Smurf attacks if prompted (that is, they would respond to ICMP requests sent to broadcast addresses). The original Smurf was written by Dan Moschuk (alias TFreak) in 1997. This can slow down the victim's computer to the point where it becomes impossible to work on. If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooded with traffic. Most devices on a network will, by default, respond to this by sending a reply to the source IP address. ![]() JSTOR ( October 2015) ( Learn how and when to remove this template message)Ī Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. ![]() Unsourced material may be challenged and removed. Please help improve this article by adding citations to reliable sources. This article needs additional citations for verification. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |