1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]4 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
3. Which of the following phase types will make a sound louder? In-phase, inverted phase, or partial phase angle waves?
Vikentia [17]
The answer to your question is in-phase 
7 0
3 years ago
Read 2 more answers
MSWord is a popular___________ program.​
Xelga [282]

Answer:

graphic word processing program

6 0
2 years ago
Read 2 more answers
The git _____ command will display the last commit and what were the changes you made.
Pavlova-9 [17]

Answer:

Log

Explanation:

The git log command enables you to display a list of all of the commits on your current branch

8 0
3 years ago
True or false that computers that are joined together are able to share hardware and software, but not data
kozerog [31]
False computers are able to share hardware and software but not data
8 0
3 years ago
The worlds two highest dams are both in tajikistan. the rogun dam is 35 meters taller than the nurek dam. together they are 635
Hitman42 [59]
The nurek dam is 300 meters tall.
300 + 335 = 635
5 0
3 years ago
Other questions:
  • Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf
    15·1 answer
  • "Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
    10·1 answer
  • He would like to get rid of the graph. What will accomplish
    8·1 answer
  • I need to write a program that accepts eight int values representing student test scores from the user and then displays each of
    14·1 answer
  • When using the boolean data type, we encapsulate the data in what symbol?
    11·2 answers
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • Digital communication and production chapter 17
    6·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!