Attack traffic that emanates from multiple devices is considered Distributed-Denial-of-Service (DDoS) attack. Others types of ICMP request attacks may involve custom tools or code, such as hping and scapy. This causes the target to become inaccessible to normal traffic. By flooding the target with request packets, the network is forced to respond with an equal number of reply packets. Normally, ICMP echo-request and echo-reply messages are used to ping a network device in order to diagnose the health and connectivity of the device and the connection between the sender and the device. An Internet Control Message Protocol (ICMP) flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |