首页> 外文会议>Convention of Computer Society of India >ICMP Flood Attacks: A Vulnerability Analysis
【24h】

ICMP Flood Attacks: A Vulnerability Analysis

机译:ICMP洪水攻击:漏洞分析

获取原文

摘要

The increasing rate of cyberattacks based on the DDoS principle has created various new areas of concern for information security. It has also raised a pertinent question-Are we protected against such attacks? With significant rise in the number of attacks and resulting reports of high vulnerability to ICMP flood attacks, perhaps we need to reconsider and revisit the pros and cons of the ICMP protocol. In this paper, we mainly focus on giving readers a brief outline of DDoS attacks and its constituents, primarily the ICMP protocol. We also present a survey and the research findings that show the rising vulnerability to ICMP and subsequently DDoS.
机译:基于DDOS原则的网络攻击率越来越多地为信息安全创造了各种新的关注领域。它还提出了一个相关的问题 - 我们是否受到保护的攻击?由于攻击人数和对ICMP洪水袭击的高脆弱性报告的显着增加,也许我们需要重新考虑并重新审视ICMP协议的利弊。在本文中,我们主要关注读者一段简短的DDOS攻击及其成分的概要,主要是ICMP协议。我们还提出了一项调查和研究结果,显示了对ICMP和随后DDOS的脆弱性脆弱性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号