The 5-Second Trick For DDoS attack
[83] ICMP echo request attacks (Smurf attacks) may be regarded just one method of reflected attack, as being the flooding hosts ship Echo Requests to the broadcast addresses of mis-configured networks, thereby attractive hosts to send Echo Reply packets towards the target. Some early DDoS programs carried out a distributed variety of the attack.[12