1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]4 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
slavikrds [6]

Answer:

Check your router connections then restart your router.

Explanation:

When the internet connection is not displaying properly then the first step is to check the router. The network icon on the internet displays the availability of internet. Adjust the router and see if the router is working properly. If not restart the router so that it adjusts its settings to default. The connection will be available on the computer and internet will start working normally.

3 0
3 years ago
We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
Anika [276]

Answer:

3.1 ns ; 1.25 ; 3.097

Explanation:

Given :

IF, 3 ns;

ID, 2.5 ns;

EX, 2 ns;

MEM, 3 ns;

WB, 1.5 ns.

Use 0.1 ns for the pipelineregisterdelay

maximum time required for MEM = 3 ns

Pipeline register delay = 0.1 ns.

Clock cycled time of the pipelined machine= maximum time required + delay

3ns+0.1 ns = 3.1 ns

2.) for stall after every 4 instruction :

CPI of new machine :

(1 + (1 /4)) = 1 + 0.25 = 1.25

3.)

The speedup of pipelined machine over the single-cycle machine is given by :

Average time per instruction of single cycle ÷ average time per instruction of pipelined

Clock time of original machine = 12ns

Ideal CP1 = 1

CPI of new machine = 1.25

Clock period = 3.1 ns

(12 * 1) / (1.25 * 3.1) = 12 / 3.875

= 3.097

D. Speed up will equal the number of stages in the machine

8 0
3 years ago
How to connect an Apple Watch series 3 to your iPhone (ASAP)
inn [45]

Im not sure but okay

7 0
3 years ago
Read 2 more answers
Which type of financial institution typically has membership requirements?
zheka24 [161]
The answer is online commercial banking :)
7 0
4 years ago
Read 2 more answers
The two types of objects responsible for collecting data are
andrezito [222]
Hey there,
The answer is <span>tables and forms

Hope this helps :))

~Top
</span>
7 0
3 years ago
Other questions:
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • Function Name: d2x Parameters: int, int Returns: string Description: Write function, d2x, that takes as input a nonnegative inte
    10·1 answer
  • The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
    5·1 answer
  • What code do I have to use in my php if i don’t want my $_SESSION[“variablex”] to destroy? But i already have a session_destroy(
    6·1 answer
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • 1.a computer can create an output based on the input of the user.
    13·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • Aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!