In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away.
Attributes | Values |
---|
rdf:type
| |
rdfs:label
| |
rdfs:comment
| - In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. (en)
|
dcterms:subject
| |
Wikipage page ID
| |
Wikipage revision ID
| |
Link from a Wikipage to another Wikipage
| |
sameAs
| |
dbp:wikiPageUsesTemplate
| |
date
| |
reason
| - Does the signature give away the identity of the program or the attacker? (en)
|
has abstract
| - In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. As long as the computer is safely behind a router or a firewall, there is nothing to worry about with this attack. With this attack, the adversary intends to prevent the system from operating normally, i.e. a denial of service. Configuring upstream network devices (including firewalls and routers) to ignore ICMP packets from the public Internet will make this almost certainly not succeed. (en)
|
prov:wasDerivedFrom
| |
page length (characters) of wiki page
| |
foaf:isPrimaryTopicOf
| |
is Link from a Wikipage to another Wikipage
of | |
is Wikipage redirect
of | |
is foaf:primaryTopic
of | |