Explanation

icmpflood is a type of DDoS attack that sends a large number of ICMP packets to a target network, which can result in network congestion, packet loss, and service disruption. The Netography Detection Method (NDM) for icmpflood analyzes network traffic for high-volume ICMP traffic with a high packet per second (PPS) rate.

What to Look For

To examine the results of the icmpflood event, network operators should look for a high volume of ICMP traffic with a high PPS rate, which may indicate an ongoing DDoS attack. The Netography Fusion Portal provides details on the source and destination IP addresses associated with the ICMP traffic, allowing for targeted mitigation efforts. Operators should also examine endpoint logs to identify any anomalies or disruptions to usual network traffic patterns. It is recommended that network operators have DDoS mitigation strategies in place to quickly identify and respond to such attacks.

Related MITRE ATT&CK Categories

Network Denial of Service, Technique T1498 - Enterprise