Best WordPress Hosting
 

ICMP Attacks: Everything You Need To Know

via ithemes.com => original post link

It is no surprise that hackers strive to find a weakness in everything, from simple software to the most fundamental protocols that underpin the structure of the Internet as we know it. As one of the essential components of the Internet protocol stack, Internet Control Message Protocol acts as a global message carrier, conveying vital information about the state of the network devices and whole networks that form the worldwide web.

Although an invaluable communication tool, ICMP becomes a potential avenue for attackers to harness the weaknesses inherent in its design. Exploiting the trust network devices place in ICMP messages, malicious actors attempt to circumvent security systems deployed by the victim’s host, causing disruptions to network operations, which can ultimately result in denial of service.

As a distinct group of denial of service attacks, ICMP attacks are no longer a primary tool in the attacker’s toolbox. However, they continue wreaking havoc on online businesses. Ping flood attacks, smurf attacks, and the so-called ping of death – all of those are different variations of ICMP attacks that can still pose a threat to network operations worldwide.