Technical AnalysisĪs seen in the Image 1 an ICMP Flood of type 8 consists of a high volume of ICMP Echo packets. Generally this flood is used as a basic but effective flood to bring down perimeter devices or saturate bandwidth. ICMP Floods, if not dropped by DDoS mitigation devices on the perimeter, may overwhelm the internal network architecture this flood may also generate outgoing traffic due to answers for the echo request. ICMP Floods are generally spoofed attacks and normally come at a very high rate, they are effectively echo requests, that may illicit echo responses (ICMP Type 0). ICMP Floods are DDoS attacks aimed at consuming computing power and saturating bandwidth.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |