Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,651,328 papers from all fields of science
Search
Sign In
Create Free Account
Smurf attack
Known as:
Smurf (disambiguation)
, Fraggle attack
, Smurf amplifier
Expand
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Attack (computing)
Broadcast address
Broadcast radiation
Broadcasting (networking)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Analyzing network traffic data using Hive queries
D. Patel
,
Xiaohong Yuan
,
K. Roy
,
Aakiel Abernathy
SoutheastCon
2017
Corpus ID: 36067824
Billions of devices are connected together with internet to serve the communication. Network monitoring to detect various…
Expand
2013
2013
Modelling and simulation of DDOS Attack using SimEvents
A. Bala
,
Y. Osais
,
S. Arabia
2013
Corpus ID: 15028256
At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which is the Distributed DoS (DDoS…
Expand
2012
2012
SMURF: Supporting Multi-tenancy Using Re-aspects Framework
Mohamed Almorsy
,
J. Grundy
,
Amani S. Ibrahim
IEEE International Conference on Engineering of…
2012
Corpus ID: 12018971
Software-as-a-service multi-tenancy helps service providers to cut cost, improve resource utilization, and reduce service…
Expand
2011
2011
Smurf Attacks: Attacks using ICMP
Kavita Choudhary
2011
Corpus ID: 110593911
IP Address Spoofing attacks are used to take control over computer by unauthorized means, whereby the attacker sends messages to…
Expand
2009
2009
Identification of effective network features to detect Smurf attacks
Gholam Reza Zargar
,
P. Kabiri
Student Conference on Research and Development
2009
Corpus ID: 22890405
Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature…
Expand
2007
2007
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract)
K. Brzezinski
International Conference on Detection of…
2007
Corpus ID: 6243890
We explore the idea of using the internationally standardized test language TTCN-3 (Testing and Test Control Notation) as a…
Expand
2006
2006
Design of Host-based Defense System against Smurf Attack
Xiaosong Lei
2006
Corpus ID: 114993289
Smurf attack is one common method among denial of service attacks.Utilizing the bugs of TCP/IP protocol together with spoofed IP…
Expand
2006
2006
Can Microsoft’s Service Pack2 (SP2) Security Software Prevent SMURF Attacks?
Sanjeev Kumar
,
Montasir Azad
,
O. Gomez
,
R. Valdez
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 10248804
DDoS flooding attacks are quite popular with hackers and they can cause devastating impact on computer systems. Smurf attack is a…
Expand
2006
2006
Category Theory-Based Synthesis of a Higher-Level Fusion Algorithm: An Example
M. Kokar
,
K. Baclawski
,
Hongge Gao
Fusion
2006
Corpus ID: 6364737
Higher-level fusion (e.g., level 2 that deals with derivation of relations among objects) often involves symbolic processing of…
Expand
2002
2002
A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks
Gregory W. Rice
,
J. Davis
2002
Corpus ID: 6830046
Availability requires that computer systems remain functioning as expected without loss of resources to legitimate users. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE