HostedDB - Dedicated UNIX Servers

ICMP_Scanning_37
ICMP Usage in Scanning 37 Copyright Ó Ofir Arkin, 2000 http://www.sys-security.com 8.0 Conclusion The ICMP protocol is a very powerful tool in the hands of smart malicious computer attackers. Mapping and detecting of hosts and networking devices can be done in various ways as I have outlined in this paper. It is extremely important to understand that ICMP traffic can be used to other malicious activities other than scanning, such as: · Denial of Service Attacks · Distributed Denial of Service Attacks · Covert Channel Communications Therefore filtering Inbound and Outbound ICMP traffic is very important and may help you in preventing risks to your computing environment.