The attack that Barbara investigates is most likely a smurf.
Characteristic of the smurf attack is that ICMP packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address and as a result the internet control message protocol (ICMP) echo replies coming into
her network far exceed the ICMP echo requests leaving her network.