DDoS attack Fundamentals Explained
[83] ICMP echo request attacks (Smurf attacks) could be viewed as 1 method of reflected attack, because the flooding hosts ship Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing hosts to mail Echo Reply packets to the victim. Some early DDoS applications executed a distributed kind of this attack.In conditions fo