Goals of Attacks
Prevent another user from using
network connection
“Smurf” attacks, “pepsi” (UDP floods), ping
floods
Disable a host or service
“Land”, “Teardrop”, “Bonk”, “Boink”, SYN
flooding, “Ping of death”
Traffic monitoring
Sniffing