Question

In: Computer Science

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large...

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 30-Mbps link? How many per second if the attacker uses a 100-Mbps link? Or a 1-Gbps link?

Solutions

Expert Solution

To flood a bandwidth of W bits with packets of length P bits, the attacker would need W/P packets.
1- For W=30 Mbit and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 30M/(500*8) = (30*2^20)/(4000)

                      = 7864.32. That is, close to 7865 packets per second.


2- For W=100 Mbit and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 100M/(500*8) = (100*2^20)/(4000)

                      = 26214.4. That is close to, 26215 packets per second.

3- For W=1Gbps and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 1G/(500*8) = (2^30)/(4000)

                      = 268435.456. That is close to, 268436 packets per second.


Related Solutions

In order to implement a DNS amplification attack, the attacker must trigger the creation of a...
In order to implement a DNS amplification attack, the attacker must trigger the creation of a sufficiently large volume of DNS response packets from the intermediary to exceed the capacity of the link to the target organization. Consider an attack where the DNS response packets are 1000 bytes in size (ignoring framing overhead). a. How many of these packets per second must the attacker trigger to flood a target organization using a 30-Mbps link? A 100-Mbps link? Or a 1-Gbps...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Carbonated beverages must be kept acidic in order to generate the levels of CO2 (g) desired....
Carbonated beverages must be kept acidic in order to generate the levels of CO2 (g) desired. The acidity if provided by 0.0070 M H3PO4. Calculate the [H+], [OH-], [H3PO4], [H2PO4-], [HPO42-], and [PO43-], as well as pH, in a can of cola.
Orange County Community Health Plan must be able to generate certain data sets in order to...
Orange County Community Health Plan must be able to generate certain data sets in order to compute the break-even point for the proposed new satellite facility. Some of these data elements can be obtained from existing information systems, and others must be estimated or obtained through surveys. The available data include the following: a. Data from existing information systems: Total variable costs $180,000 per 100 enrollees or $1,800 per enrollee per year b. Data obtained from estimates: Total fixed costs...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT