Final answer:
The described DoS attack is known as the Land attack and occurs when a spoofed TCP SYN packet is sent to a host with its own IP for both source and destination, leading to a self-replicated response loop.
Step-by-step explanation:
The type of DoS attack described in the question is known as the Land attack. This attack involves sending a spoofed TCP SYN packet to a host with its own IP address as both the source and the destination. The result is that the host system keeps responding to itself, leading to a denial-of-service condition as it becomes overwhelmed with these repetitive tasks.
Here's a brief overview of the other attacks mentioned for comparison:
- A Smurf attack involves sending ICMP requests to network broadcast addresses from a spoofed source IP, causing all the hosts to reply to the victim and overwhelm it with traffic.
- Fraggle is similar to a Smurf attack but uses UDP echo packets directed to a broadcast address, again with a spoofed source IP pointing to the victim.