Question

In: Computer Science

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large...

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 30-Mbps link? How many per second if the attacker uses a 100-Mbps link? Or a 1-Gbps link?

Solutions

Expert Solution

To flood a bandwidth of W bits with packets of length P bits, the attacker would need W/P packets.
1- For W=30 Mbit and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 30M/(500*8) = (30*2^20)/(4000)

                      = 7864.32. That is, close to 7865 packets per second.


2- For W=100 Mbit and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 100M/(500*8) = (100*2^20)/(4000)

                      = 26214.4. That is close to, 26215 packets per second.

3- For W=1Gbps and P=500 byte=(500*8)=4000 bits

the attacker would need:

                W/P= 1G/(500*8) = (2^30)/(4000)

                      = 268435.456. That is close to, 268436 packets per second.


Related Solutions

In order to implement a DNS amplification attack, the attacker must trigger the creation of a...
In order to implement a DNS amplification attack, the attacker must trigger the creation of a sufficiently large volume of DNS response packets from the intermediary to exceed the capacity of the link to the target organization. Consider an attack where the DNS response packets are 1000 bytes in size (ignoring framing overhead). a. How many of these packets per second must the attacker trigger to flood a target organization using a 30-Mbps link? A 100-Mbps link? Or a 1-Gbps...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Carbonated beverages must be kept acidic in order to generate the levels of CO2 (g) desired....
Carbonated beverages must be kept acidic in order to generate the levels of CO2 (g) desired. The acidity if provided by 0.0070 M H3PO4. Calculate the [H+], [OH-], [H3PO4], [H2PO4-], [HPO42-], and [PO43-], as well as pH, in a can of cola.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT