As The Victim Of A Smurf Attack What Protection Measure
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
As The Victim Of A Smurf Attack What Protection Measure?
Today let us learn about the concept of the Smurf attack in detail. The Smurf attack is one of the types of DOS attacks. This dos is nothing but a denial of service attack. The main aim of the denial of service attack is in order to target the system device or a network and make all the resources unavailable to the users.
This denial of service Works By simply making the network or any device to be temporarily unavailable. Usually, in the denial of service, many of the attackers will be able to create the package called ICMP and this ICMP packet will be sent to the IP broadcast packet.
The attacker will use the IP address of target devices and the source devices when the devices in the network receive the ICMP packet and after receiving the ICMP packet the devices will be able to send the replies. And the ICMP packets that are sent before consist of a spoofed IP. Hence all the replies that are sent will be received by the attacker.
This is how the smurf attack works. All the computers or devices that are present in the network replies will be received by the attacker device.
And as the number of users increases, the ICMP replies will block the target host machine, now this will slow down the target host machine and lead to entirely inaccessibility. Now, this is called a denial of service attack.
Now let us know how to prevent the Smurf attack. There are mostly three different types of ways in order to prevent the Smurf attack. Firstly all the hosts and the routers that are present in the network can able to configure and can able to not respond to the ICMP requests.
Here we can able to configure all the routers in order to not forward the packets directly to the IP addresses. This Smurf attack is considered as the distributed denial of service attack where all the large numbers of the internet control message protocol which is shortly called ICMP along with the intended victim spoofed IP addresses will be broadcasted into the computer by simply using an IP address.
Most of the devices that are present on the network will default respond to by simply sending the replies to the source IP address.
And as we said earlier if the number of devices that are receiving and sending the replies is more then the victims will be get flooded with the traffic and it will slow down the computer.
These victims’ computers will be closed until it becomes impossible to work on them anymore. Most of the IP addresses will be able to participate in the small type of attacks. Here this will be able to respond to the request that is sent by the broadcast addresses.
Hence many least number of their computers be able to vulnerable the Smurf attacks. There are two types for fixing, One is to unfold the individual devices. Or configuring the routers in order not to forward the packets.