 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Very dangerous
attacks
|
|
|
|
Network-based,
fills access pipes
|
|
|
|
Uses ICMP
echo/reply (smurf) or UDP echo (fraggle)
|
|
|
packets with
broadcast networks to multiply traffic
|
|
|
|
Requires the
ability to send spoofed packets
|
|
|
• |
Abuses
“bounce-sites” to attack victims
|
|
|
|
Traffic
multiplied by a factor of 50 to 200
|
|
|
|
Low-bandwidth
source can kill high-bandwidth
|
|
|
connections
|
|
|
• |
Similar to
ping flooding, UDP flooding but
|
|
|
more
dangerous due to traffic multiplication
|