1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]4 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
Which invention allowed computers to become smaller in size?
dexar [7]
computers got smaller because one of its main components the valve – was replaced by the much smaller transistor.
7 0
3 years ago
Item 3Item 3 John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastruc
White raven [17]

Answer:

Replacing computer parts.

Explanation:

John replaces faulty computer parts, such as DVDs, hard drives, ram cards, wires etc. John can also replace the whole motherboard or clean it (for dust).

Computer parts not functioning properly or dying is a common problem in computer systems. Motherboard, the circuit that holds all the components of a computer, like CPU, Ram and Hard disk, can also fail or die.

5 0
3 years ago
What are 3 ways to get friends to stop texting and driving?
Leni [432]
Not allow them to use their phone, tell them you won’t get in the car with them unless they stop texting and driving, inform their parents
3 0
3 years ago
Read 2 more answers
A standardized specification of a motherboard (including its dimensions, supported power supply types, and layout of components)
Alik [6]
The correct answer is 'Form Factor'. The standardized specification of a motherboard ( including it's dimensions, supported power supply types, and layout of components) is know as the motherboard's form factor.
5 0
3 years ago
Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?
DerKrebs [107]

Answer:

e

Explanation:

the valid sql syntax for creating table is

CREATE TABLE table_name (

column_name column_type

)

varchar and int are the valid sql types not string and integer

AS is used in select queries to aggregate results under given name

8 0
3 years ago
Other questions:
  • I need HELP ASAP! 30 POINTS to the RIGHT answer.
    12·2 answers
  • In a class hierarchy,
    15·1 answer
  • How are appointments scheduled in medisoft
    12·1 answer
  • Amelia has selected the chart in her PowerPoint and needs to change the chart type. Which one of the Chart Tools tabs would she
    15·1 answer
  • Explain what a lookup table is (assembly). Write pseudo code
    13·1 answer
  • Given an char variable last that has been initialized to a lowercase letter, write a loop that displays all possible combination
    8·1 answer
  • To print factorial of any<br>input number <br>QBASIC​
    6·1 answer
  • They have outlined their technical needs and have sent some of the documentation along with the potential provider's SLAs and te
    14·1 answer
  • An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a p
    9·1 answer
  • What will be the result from running the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!