Network Security
A ping flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an intruder tries to overcome a targeted device with ICMP echo requests. Typically, ICMP echo-request and echo-reply messages are used to ping a network device to diagnose the device's health and connectivity and the link between the sender and the device. The network is forced to respond with an equal number of reply packets by flooding the target with request packets. This causes the target to become unavailable to regular traffic. A ping attack demands that the intruder knows the IP address of the destination. Attacks can be divided into three kinds, arranged by the target and how the IP address is resolved: Blind ping – This involves using an external program to reveal the IP address of the target computer or router before launching a DDoS attack. Router disclosed – the ping flood targets routers to obstruct information between computers