This is a network based attack where the attacker(s) send out false ICMP echo requests that appear to originate from the IP address of the machine or network under attack. This type of attack can be used to flood a network or device with "responses" to the false ICMP requests.
A type of Denial of Service attack. If a "ping" is sent directly to a broadcast or multicast address on a network, the routers may forward the pings on to all of the hosts on the network, all of those hosts may respond. If they do, then an attacker can create many times more traffic on your network than they sent to it. Basically, this attack uses the broadcast address to magnify or amplify the amount of traffic the attack sends.
A maliciously sent PING request sent to an Internet broadcast address, where it can be replicated up to 255 times. Since the attacker's address appears to be the address of the victim, all PING request replies come to the victim's address instead of the real sender's address. A single attacker sending thousands of these PING messages per second can bring an entire ISP network down by filling its T-1 or T-3 with PING replies. The Computer Emergency Response Team at Carnegie Mellon University said Smurf attacks went up from 3 percent of reported incidents in January 1998 to 10 percent by December 1998.
a kind of DoS attack where an attacker causes a victim to be flooded with ICMP echo (Ping) replies sent from another network
a sort of Brute Force DOS Attack, in which a huge number of Ping Requests are sent to a system (normally the router) in the Target Network, using Spoofed IP Addresses from within the target network
a type of denial-ofservice intrusion intended to disable the target's servers
a type of Internet Server attack focused on the explotation of an IP address under the category "denial of service" or "spoofing" and usually relies on the "ping" and "ICMP" protocol
When a perpetrator sends a large number of ICMP echo (ping) traffic at IP broadcast addresses, using a fake source address. The source address will be flooded with simultaneous replies.
To use ICMP echo request packet s directed to an IP broadcast address or multiple broadcast addresses from remote locations to create severe network congestion or outages.
An attack involving ICMP echo packets, such as those generated by the PING command. These are sent to broadcast address on a network, but the reply address is spoofed to appear as the victims, thus all devices on the network will respond, flooding the victims network link.
A malicious attack where the hacker sends a large number of spoofed ping packets to broadcast addresses, with the intent that these packets will be magnified and sent to the spoofed addresses. This has exponential possibilities, depending on how many hosts respond.
A denial-of-service attack that floods its targets with replies to ICMP echo (ping) requests. A Smurf attack pings Internet broadcast addresses, which in turn forward the requests to as many as 255 hosts on a subnet. The return address of the ping request is actually the address of the attack target. All hosts receiving the ping requests reply to the attack target, flooding it with replies.
The smurf attack, named after its exploit program, is a denial-of-service attack that uses spoofed broadcast ping messages to flood a target system.