During a Smurf attack the attacker sends a large amount of ICMP packets to the IP address of the victim i.e. pings, and do it with a fake IP address source. Because most devices on the network have default IP address replying by default, they are automatically trying to respond. And if there is a large number of computers in the network that accept and respond to these packets, the victim’s computer is soon flooded with traffic. This can lead to such a slowdown in the service that it would not be possible to work with it. The principle of this attack is similar to that of an ICMP Flood, but moreover it adds reinforcement. This is achieved by sending the ping directly to the victim’s IP address, instead of sending the ping directly to the network, by setting the source IP address to the victim’s IP address. All computers from the target network will respond to the victim with the “ICMP Echo reply” packet. The higher the number of computers in the network, the more harmful the attack.