Friday, May 11, 2018

How to prevent a Smurf attack

What is a Smurf attack?

A Smurf attack is a type of denial of service attack in which a system is flooded with spoofed ping messages. This creates high computer network traffic on the victim’s network, overwhelming the target.

The intended result is to slow down the target’s system to the point that it is inoperable, and vulnerable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

How does it work?

It's possible to accidentally download the Smurf Trojan from an unverified website or via an infected email link. Usually, the program will remain dormant on a computer until activated by a remote user;
Smurf attacks target a router that interacts with a high number of devices. 

The attacker then deploys large ICMP requests to the router, causing the connected devices to respond to the ping. The spoofed IP address that is attached to these packets is forced to absorb the echoes, which is a result of connected devices responding to the ping.

Any device connected to this router that is trained to respond to the ping will be unable to recognize the spoofed IP addresses.

Hackers gain access to the systems that are connected to their original target, slowing down a larger subset of the - this would not be possible by attacking just one victim.

How to prevent a Smurf attack?

Dealing with Smurf and similar DDoS attacks requires a prevention strategy that can monitor network traffic and detect any oddities, for example packet volume, behavior and signature. The right security service can help shut down a Smurf or other DDoS attack before it begins.

Therefore, you should install an antivirus and an anti-malware protection on time to effectively prevent all types of attacks.

You can protect yourself from a Smurf attack by blocking directed broadcast traffic that is coming into the network.

You should also disable IP broadcast addressing at each network router since it is seldom used. Make sure to configure hosts and routers not to respond to ICMP echo requests.

Stay safe with Zemana :)


  1. Great exactly what I was looking for! thank you
    - Impossible game -

  2. I quite like reading through an article that will make men and women think. Also, many thanks for permitting me to comment!
    Although There is a rising requirement for getting Facetime for Windows But, Android users possess many options similar to facetime for android. However, if Windows users still desire to experience Facetime just, here is the way they are able to perform it.

  3. Excellent website provideĈ° a lot of useful posts. Thanks a lot for sharing gmail sign up

  4. CrownQQ | Agen Domino QQ | BandarQ | Domino99 Online Terbesar
    Susah cari Situs judi online yang bisa di percaya...?
    Mari gabung di AGEN BANDARQ CROWNQQ
    Bonus Refferal 20%
    Bonus Turn Over 0,5%
    Agen Judi Online Terbesar dan Terpercaya se asia
    Daftar dan buktikan sendiri sekarang juga..
    WHATSAPP : +855967646513
    PIN BB : 2B382398