1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]3 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
Press the _______ key to move to the next cell in a row.
swat32
I believe it's
C. Tab
7 0
3 years ago
Read 2 more answers
(a) Convert to hexadecimal: 1457.1110. Round to two digits past the hexadecimal point.
zaharov [31]

Answer:

Following is attached solution to each part. I hope it will help you!

Explanation:

4 0
3 years ago
What does expected initializer before ". " token mean?
densk [106]

;l p lm k                  nnnnnnnnnnnnnnnnnnnnnnnnnnnnnn

4 0
3 years ago
IMPORTANT HELP
balu736 [363]

Answer:

plz am so sorry I don't no it

Explanation:

Plz give me brainiest

6 0
3 years ago
List any two features of this computer
zaharov [31]

Answer:

John Mauchy 1. designed to be a stored-program computer 2. it was binary rather than decimal

3 0
2 years ago
Other questions:
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • Okay so, not really a question but whatever it’s been bothering me.
    9·2 answers
  • Webster defines risk as "the possibility of loss or injury". Therefore, driving a motor vehicle is a risk.
    12·1 answer
  • Write a function that will alphabetize a string WITHOUT using the sort function :
    7·1 answer
  • Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
    12·2 answers
  • Which one of the following items is an example of software?
    5·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
  • What would the input, process, outcome and feedback be for a class assignment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!