A small isp requests your help, Computer Network Security

Assignment Help:

QUESTION

A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provider. They provide you with the following logs. What type of attack is this? What can be done to fix the problem?

16:16:07.607758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46507)

16:16:07.607758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 802)

16:16:07.607758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60,id 3187)

16:16:07.607758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12937)

16:16:10.877758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46508)

16:16:10.877758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 803)

16:16:10.877758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12938)

16:16:10.877758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60, id 3188)

16:16:12.757758 195.210.86.88 > 255.255.255.255: icmp: echo request (ttl 241, id 64402)

16:16:12.757758 207.24.115.20 > 195.210.86.88: icmp: echo reply (ttl 64, id 804)

16:16:12.757758 207.24.115.111 > 195.210.86.88: icmp: echo reply (ttl 60, id 12939)

16:16:12.757758 207.24.115.112 > 195.210.86.88: icmp: echo reply (ttl 60, id 3189)


Related Discussions:- A small isp requests your help

Lan topologies, Network can be distinguished by shape. According to which t...

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Cryptography, hi have a look and tell me if u can do it. if u can do Q1then...

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

Limitations of firewall, Limitations of firewall Firewalls cannot prote...

Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

Hybrid cryptography systems-cryptography, Hybrid Cryptography Systems Th...

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Pinging a web server, Ask quIf you are pinging a web server from a user’s c...

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Describe the use of control channels in gsm network, Problem 1: What is...

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Network security course work, doing coursework in Network Security to prese...

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd