A small isp requests your help, Computer Network Security

Assignment Help:

QUESTION

A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provider. They provide you with the following logs. What type of attack is this? What can be done to fix the problem?

16:16:07.607758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46507)

16:16:07.607758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 802)

16:16:07.607758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60,id 3187)

16:16:07.607758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12937)

16:16:10.877758 130.127.120.29 > 255.255.255.255: icmp: echo request (DF) (ttl 238, id 46508)

16:16:10.877758 207.24.115.20 > 130.127.120.29: icmp: echo reply (ttl 64, id 803)

16:16:10.877758 207.24.115.111 > 130.127.120.29: icmp: echo reply (ttl 60, id 12938)

16:16:10.877758 207.24.115.112 > 130.127.120.29: icmp: echo reply (ttl 60, id 3188)

16:16:12.757758 195.210.86.88 > 255.255.255.255: icmp: echo request (ttl 241, id 64402)

16:16:12.757758 207.24.115.20 > 195.210.86.88: icmp: echo reply (ttl 64, id 804)

16:16:12.757758 207.24.115.111 > 195.210.86.88: icmp: echo reply (ttl 60, id 12939)

16:16:12.757758 207.24.115.112 > 195.210.86.88: icmp: echo reply (ttl 60, id 3189)


Related Discussions:- A small isp requests your help

Imap and pop functions, How does the POP functions? What are the advantages...

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Fuckkkkk, Ask question #Minimum.. 100 words accepted#

Ask question #Minimum.. 100 words accepted#

Explain how ethernet deals with collisions, (a) Describe how CSMA/CD operat...

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

Define repeater, Repeater known as regenerator ; it is an electronic mac...

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

Explain what is a broadcast storm, QUESTION: (a) Ethernet has grown in ...

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

CNSS, Assume that a security model is needed for the protection of informat...

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd