A small isp requests your help, Computer Network Security

Assignment Help:

QUESTION

A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provider. They provide you with the following logs. What type of attack is this? What can be done to fix the problem?

16:16:07.607758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46507)

16:16:07.607758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 802)

16:16:07.607758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60,id 3187)

16:16:07.607758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12937)

16:16:10.877758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46508)

16:16:10.877758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 803)

16:16:10.877758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12938)

16:16:10.877758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60, id 3188)

16:16:12.757758 195.210.86.88 > 255.255.255.255: icmp: echo request (ttl 241, id 64402)

16:16:12.757758 207.24.115.20 > 195.210.86.88: icmp: echo reply (ttl 64, id 804)

16:16:12.757758 207.24.115.111 > 195.210.86.88: icmp: echo reply (ttl 60, id 12939)

16:16:12.757758 207.24.115.112 > 195.210.86.88: icmp: echo reply (ttl 60, id 3189)


Related Discussions:- A small isp requests your help

Potential risks to information systems, Information System Security 1. ...

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Explain possible attacks on rsa encryption, Problem (a) Describe RSA a...

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Direct indexing, DIRECT INDEXING It is less usually known method. It i...

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Categories of controls-risk management, Categories of Controls Controlli...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Emulation, In this section, you should create a program that emulates a GBN...

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

Audit or review of the information security issues, Using the selected appr...

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

Explain the approaches to lric modeling, (a) Cost allocation mechanisms ar...

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd