Dark Mode

Settings

Capec-487 Detail

ICMP Flood

Standard Communications Software

Parents: 125

Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404

Description

An adversary may execute a flooding attack using the ICMP protocol with the intent to deny legitimate users access to a service by consuming the available network bandwidth. A typical attack involves a victim server receiving ICMP packets at a high rate from a wide range of source addresses. Additionally, due to the session-less nature of the ICMP protocol, the source of a packet is easily spoofed making it difficult to find the source of the attack.

Not present

External ID Source Link Description
CAPEC-487 capec https://capec.mitre.org/data/definitions/487.html
CWE-770 cwe http://cwe.mitre.org/data/definitions/770.html

Not present

  1. This type of an attack requires the ability to generate a large amount of ICMP traffic to send to the target server.

Not present

Not present

Not present

Not present