Protocol attacks target the network layer (layer 3) and the transport layer (layer 4) of the OSI model. They aim to overwhelm critical network resources such as firewalls, load balancers and web servers with malicious connection requests.
Two of the most common types of protocol attacks include SYN flood attacks and smurf attacks.
A SYN flood attack takes advantage of the TCP handshake, a process by which two devices establish a connection with one another. A typical TCP handshake has three steps:
- One device sends a synchronization (SYN) packet to initiate the connection.
- The other device responds with a synchronization/acknowledgment (SYN/ACK) packet to acknowledge the request.
- The original device sends back an ACK packet to finalize the connection.
In a SYN flood attack, the attacker sends the target server a large number of SYN packets with spoofed source IP addresses. The server responds to the spoofed IP addresses and waits for the final ACK packets. Because the source IP addresses were spoofed, these packets never arrive. The server is tied up in a large number of unfinished connections, leaving it unavailable for legitimate TCP handshakes.
A smurf attack takes advantage of the Internet Control Message Protocol (ICMP), a communication protocol used to assess the status of a connection between two devices.
In a typical ICMP exchange, one device sends an ICMP echo request to another, and the latter device responds with an ICMP echo reply.
In a smurf attack, the attacker sends an ICMP echo request from a spoofed IP address that matches the victim’s IP address. This ICMP echo request is sent to an IP broadcast network that forwards the request to every device on a network.
Every device that receives the ICMP echo request—potentially hundreds or thousands of devices—responds by sending an ICMP echo reply to the victim’s IP address. The sheer volume of responses is more than the victim's device can handle. Unlike many other types of DDoS attacks, smurf attacks do not necessarily require a botnet.