1. CERT Coordination Center
Carnegie Mellon University. In advisory CA-1998-01
the distinction is made clear: "A variation of this attack
called 'fraggle
' uses UDP echo packets in the same fashion [as a Smurf attack uses ICMP packets]."
Source: CERT® Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks. (January 28
1998). Section: "III. Description".
2. Kurose
J. F.
& Ross
K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. University-level textbooks on computer networking describe these attacks. In discussions on Denial-of-Service
the Smurf attack is defined by its use of ICMP echo requests to a broadcast address
while the Fraggle attack is noted as a variant using UDP packets.
Source: Chapter 8
"Security in Computer Networks
" Section 8.2
"Denial of Service (DoS) Attacks."
3. Forouzan
B. A. (2010). TCP/IP Protocol Suite (4th ed.). McGraw-Hill. This academic text details various network attacks. It describes the Smurf attack as using ICMP and the Fraggle attack as its UDP-based counterpart
both leveraging broadcast addresses for amplification.
Source: Chapter 29
"Security
" Section: "Denial-of-Service Attacks."