The 5-Second Trick For DDoS attack
[83] ICMP echo request attacks (Smurf attacks) can be considered just one kind of reflected attack, given that the flooding hosts deliver Echo Requests to the published addresses of mis-configured networks, thereby attractive hosts to deliver Echo Reply packets to the target. Some early DDoS applications implemented a distributed variety of this at