![]() This is done by sending a large number of ping ‘echo requests’ from a large number of ‘zombies’ which spread across the network. In Ping flood attacks, these ICMP packets are exploited. Ping, a well known command line utility, is used to send ICMP packets to test whether a particular host is reachable in the network. This brought several Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters to a halt by overwhelming the server with irrelevant requests that tied up their servers such that legitimate requests went unfulfilled. In this case, the attackers used Russian language forums and logs to spread tools such as ping flood scripts and recruited bot-nets, which were then used to fire up the network at the same time. The first such incident was reported in way back in 1989.Ĭan Ping floods be used as a form of DDoS? The answer is Yes and the 3 week long Estonian Ping Flood attack that happened in April 2007 is a prime example. While Ping itself is a great utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages, it can be misused. One of the oldest forms of DoS attack is the “Ping flood attack” also called ICMP floods. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |