Very dangerous attack
Network-based, fills access pipes
Uses ICMP echo/reply packets with broadcast networks
to multiply traffic
Requires the ability to send spoofed packets
Abuses “bounce-sites” to attack victims
Traffic multiplied by a factor of 50 to 200
Low-bandwidth source can kill high-bandwidth
Similar to ping flooding, UDP flooding but
more dangerous due to traffic multiplication