Network Security

In today’s world, security is a main concern, especially since we are connected globally. One security concern is called a ping flood. A Ping flood, or ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a computer by overwhelming it with pings. There are several ping commands that can be used to facilitate an attack. The n command represents the number of times a request is sent. The l command represents the amount of data sent with each packet. The t command, used to continue pinging until the host times out. For a ping flood to be successful, the attacking computer must have access to more bandwidth than the potential victim. The attack involves flooding the victim’s network with request packets, knowing that the network will respond with an equal number of reply packets. The exhausted server is then unavailable to process legitimate requests. According to (Larsen, ...