Denial-of-Service attacks exploit the inherent weaknesses in the TCP/IP protocol and poor implementations of the TCP/IP protocol stack. Attacks which target these inherent weaknesses include SYN Flood and Smurf. Attacks which target erroneous implementations include those operating with erroneously fragmented packets (e.g. Teardrop) or with fake sender addresses (e.g. Land). A number of these attacks, their effects and possible countermeasures are described in the following.