Resources Banner

Glossary - P

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 

Ping Flood

An application specific adaptation of ICMP flood. During a Ping flood, a victim server receives spoofed ping (IMCP echo requests) at a very high packet rate and from a very large source IP range. The victim server is overwhelmed by the large number of incoming Ping packets. The attack consumes network resources and available bandwidth, exhausting the network until it shuts down. The spoofed Source IP can be random or set as the address of the victim. Since the PING requests are usually well formed and from a large number of source IP addresses, the PING flood cannot be easily detected by either deep packet inspection or anomaly detection techniques.