Dark Mode
Capec-487 Detail
ICMP Flood
Standard Communications Software
Parents: 125
Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404
An adversary may execute a flooding attack using the ICMP protocol with the intent to deny legitimate users access to a service by consuming the available network bandwidth. A typical attack involves a victim server receiving ICMP packets at a high rate from a wide range of source addresses. Additionally, due to the session-less nature of the ICMP protocol, the source of a packet is easily spoofed making it difficult to find the source of the attack.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-487 | capec | https://capec.mitre.org/data/definitions/487.html | |
| CWE-770 | cwe | http://cwe.mitre.org/data/definitions/770.html |
Not present
- This type of an attack requires the ability to generate a large amount of ICMP traffic to send to the target server.
Not present
Not present
Not present
Not present