Smurf DDoS attack:❗️ How it works and how to mitigate

Smurf Attack Scenario

  1. The attacking malware — SMURF — is used to create fake pings. This ping definitely needs a source. The attacker uses a fake source — that is, they engineer a new source under the guise of legitimacy.
  2. The generated ping is sent to a network by which an IP broadcasts packets. This serves as an intermediary.
  3. This network naturally transmits to all the devices on its radar.
  4. As expected of a normal host-server response, all the networks send a response to the faked address.
  5. When too many simultaneous responses are sent to the server in question. It is, therefore, unable to function.

Types of Smurfs DDoS Attacks

How to Mitigate Smurf DDoS Attack?

  1. Immediately restrict the attacked structure or server from getting requests from any broadcast framework. This automatically allows the server to have time to get rid of the load.
  2. After this, you have to re-program the hosts not to answer the perceived threatening requests.

Conclusion

--

--

--

CEO at Wallarm. Application security platform to prevent threats and discover vulnerabilities in a real-time.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Largest Cryptocurrency Hack To Date: The Poly Network Hack

The Real ROI of Auth0, Part 3: Security

Security Token Market Report: September 2021

What happens when you type holbertonschool.com in your browser and press Enter

Testing for Local File Inclusion Vulnerability-Part 2

WHAT IS CLICKJACKING ?

Bluca IDO Finds Its Way to Samurai by CyberFi

Kyber Network, a Token with Massive Potential

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ivan Novikov

Ivan Novikov

CEO at Wallarm. Application security platform to prevent threats and discover vulnerabilities in a real-time.

More from Medium

DNS —Introduction & Tutorial

Three easy steps to mitigate the risk of Injection

DNS analysis in a nutshell

Stateful Redundant Firewalls Using Floating IP and Private Network