Results 1 to 6 of 6

Thread: How to avoid smurf attack

  1. #1
    Join Date
    Nov 2009
    Posts
    45

    How to avoid smurf attack

    I need some information to fix smurf attacks. What should be done to prevent this. I had seen some attacks on my network computer which is really a threat to my data. On searching on internet I had find that this are called as smurf attacks. what are these smurf attack and how can I prevent them from spoiling my computer.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,425

    Re: How to avoid smurf attack

    Let's talk a bit regarding what a Smurf Attack is and how it can be used to attack inaccessible systems and networks and cause to be them not practical. The Smurf Attack is an ICMP - based contradiction of Service Attack. In this proposal, there are two parties exaggerated, the susceptible remote network used to commence the attack and its systems, and in addition the target -victim- system that is harshly exaggerated by the attack.

  3. #3
    Join Date
    May 2008
    Posts
    3,518

    Re: How to avoid smurf attack

    In a smurf attack proposal, to develop software (known as "smurf") will execute the attack by sending a huge quantity of ICMP packets towards a given network, using IP transmit addresses. The trick consists in the fact that packets are misshapen and include the spoofed address of a victim system. In such a circumstances, misconfigured or low quality routers might perform the transmit inside the network, and as a consequence all hosts inside the restricted network that obtain the ICMP request (fundamentally an ICMP Echo Request is used) will then take action to the packet by sending ICMP responses towards the victim's IP address.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,341

    Re: How to avoid smurf attack

    There can be hundreds of systems in a restricted network that can be area under discussion to take part of the attack proposal in this fashion; the resulting traffic flow can be poisonous for the victim inaccessible system. Fundamentally, in this fashion, the inbound traffic created by the attacker is sent back multiply by the numeral of systems obtainable in the network that can be exaggerated by the attack, in a numeral equivalent to the numeral of active hosts responding to the attack.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,224

    Re: How to avoid smurf attack

    It is therefore significant to recognize that even a home client with a cable correlation has sufficient broadband to effectively launch such an attack towards several victim systems or networks. To prevent your network from such attacks, make convinced your routers are correctly configured and capable to obstruct spoofed ICMP - like for illustration by performing return path checking on the routing table, and make convinced that intended for broadcasts are not probable as this will obstruct the attack, if your router can be configured with such an alternative.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,798

    Re: How to avoid smurf attack

    To come out of this you have two alternatives. You have to arrange individual hosts and routers not to take action to ping requests or transmit. To arrange the routers not to forward packets intended for to transmit addresses. In anticipation of 1999, customary compulsory routers to forward such packets by evasion, but in that year, the regular was changed to necessitate the evasion to be not to forward. A superior router nowadays might obstruct such forwarding of directed transmit by evasion. If you are uncertain what to do, refer to network sanctuary consultants for network examination and recommendations.

Similar Threads

  1. wormhole attack and simulating blackhole attack in ns-2
    By mANICKAVASAN in forum Networking & Security
    Replies: 9
    Last Post: 01-02-2012, 11:16 PM
  2. [Want to Buy] Logitech Wingman Attack 2 or Attack 3 Joystick
    By newway01 in forum Buy Sell Computer Hardware
    Replies: 1
    Last Post: 25-04-2011, 10:37 AM
  3. Need some tips to Avoid Email Spam Attack
    By Sergeo in forum Networking & Security
    Replies: 5
    Last Post: 05-04-2010, 03:45 PM
  4. Don't know what is Smurf Attack
    By Owen Fernandes in forum Networking & Security
    Replies: 5
    Last Post: 19-01-2010, 11:16 AM
  5. How to setup a smurf tube
    By Patrickboy in forum Hardware Peripherals
    Replies: 3
    Last Post: 11-08-2009, 02:38 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •