•Goal is to severely impair or disable a host or its IP
stack
•Connects
address and port pair to itself
•Requires the ability to spoof packet source
addresses
•Requires the victim’s network to be unprotected
against packets coming from outside with own IP addresses