Smurfing

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
'''Smurfing''' or a '''Smurf Attack''' is a way of generating a lot of computer network traffic to a victim site. That is, it is a type of denial-of-service attack. Specifically, it floods a target system via spoofed broadcast ping messages.
+
'''Smurfing''' or a '''Smurf Attack''' is a form of Denial-of-Service attack where an attacker floods a target with ICMP echo (ping) traffic.  
-
 
+
-
In such an attack, a perpetrator sends a large amount of ICMP echo (ping) traffic to IP broadcast addresses, all of it having a spoofed source address of the intended victim. If the routing device delivering traffic to those broadcast addresses delivers the IP broadcast to all hosts (for example via a layer 2 broadcast), most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, hundreds of machines might reply to each packet.
+
  {| __TOC__
  {| __TOC__
Line 12: Line 10:
==What is Smurfing?==
==What is Smurfing?==
 +
'''Smurfing''' is a banking industry term used to describe the act of splitting up a large financial transaction into several smaller ones to avoid scrutiny from regulators. "Smurfing" is originally derived from a cartoon, The Smurfs, which consisted of a large society of many small individuals. The coining of the term is attributed to Miami-based lawyer, Gregory Baldwin in the 1980s.
 +
 +
'''Smurging''' or a '''Smurf Attack''' in the context of network security describes the act of many small ICMP pings being used to create very large network traffic congestion.
==How does a Smurf Attack take place?==
==How does a Smurf Attack take place?==
 +
In order for a Smurf Attack to take place there are three parties which need to be considered. First is the attack who orcastrates the attack. Second is the amplifier, who is usually another victim of the attack, and lastly, the target.
 +
===The Attacker===
 +
 +
===The Amplifier===
 +
 +
===The Target===
==Prevention==
==Prevention==
==References==
==References==
 +
http://www.webopedia.com/TERM/S/smurf.html
 +
http://www.pentics.net/denial-of-service/white-papers/smurf.cgi
 +
http://www.academ.com/nanog/oct1997/smurfing/sld001.htm
 +
http://faculty.ed.umuc.edu/~meinkej/inss690/cummins/cummins.htm
 +
http://en.wikipedia.org/wiki/Smurf_attack
 +
http://www.networkworld.com/archive/1999b/0222gearhead.html
 +
http://www-arc.com/sara/cve/Possible_DoS_problem.html
 +
<hr>
<hr>
[[User:Shahinrs|Shahinrs]]
[[User:Shahinrs|Shahinrs]]

Revision as of 20:19, 13 April 2008

Smurfing or a Smurf Attack is a form of Denial-of-Service attack where an attacker floods a target with ICMP echo (ping) traffic.



Brainy Smurf
Smurfs, as a society, were against any sort of attack.

Contents

What is Smurfing?

Smurfing is a banking industry term used to describe the act of splitting up a large financial transaction into several smaller ones to avoid scrutiny from regulators. "Smurfing" is originally derived from a cartoon, The Smurfs, which consisted of a large society of many small individuals. The coining of the term is attributed to Miami-based lawyer, Gregory Baldwin in the 1980s.

Smurging or a Smurf Attack in the context of network security describes the act of many small ICMP pings being used to create very large network traffic congestion.

How does a Smurf Attack take place?

In order for a Smurf Attack to take place there are three parties which need to be considered. First is the attack who orcastrates the attack. Second is the amplifier, who is usually another victim of the attack, and lastly, the target.

The Attacker

The Amplifier

The Target

Prevention

References

http://www.webopedia.com/TERM/S/smurf.html http://www.pentics.net/denial-of-service/white-papers/smurf.cgi http://www.academ.com/nanog/oct1997/smurfing/sld001.htm http://faculty.ed.umuc.edu/~meinkej/inss690/cummins/cummins.htm http://en.wikipedia.org/wiki/Smurf_attack http://www.networkworld.com/archive/1999b/0222gearhead.html http://www-arc.com/sara/cve/Possible_DoS_problem.html



Shahinrs

Personal tools