•Very dangerous
attacks
Network-based, fills access pipes
Uses ICMP echo/reply (smurf) or UDP echo (fraggle) packets with broadcast networks to
multiply traffic
Requires the ability to send spoofed packets
•Abuses “bounce-sites” to
attack victims
Traffic multiplied by a factor of 50 to 200
Low-bandwidth source can kill high-bandwidth connections
•Similar traffic content to ping, UDP flooding but more dangerous due to
traffic multiplication