A small isp requests your help, Computer Network Security

Assignment Help:

QUESTION

A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provider. They provide you with the following logs. What type of attack is this? What can be done to fix the problem?

16:16:07.607758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46507)

16:16:07.607758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 802)

16:16:07.607758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60,id 3187)

16:16:07.607758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12937)

16:16:10.877758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46508)

16:16:10.877758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 803)

16:16:10.877758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12938)

16:16:10.877758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60, id 3188)

16:16:12.757758 195.210.86.88 > 255.255.255.255: icmp: echo request (ttl 241, id 64402)

16:16:12.757758 207.24.115.20 > 195.210.86.88: icmp: echo reply (ttl 64, id 804)

16:16:12.757758 207.24.115.111 > 195.210.86.88: icmp: echo reply (ttl 60, id 12939)

16:16:12.757758 207.24.115.112 > 195.210.86.88: icmp: echo reply (ttl 60, id 3189)


Related Discussions:- A small isp requests your help

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

What is meant by certificate revocation, QUESTION (a) Which PKI (Public...

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Explain the approaches to lric modeling, (a) Cost allocation mechanisms ar...

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd