About: Twinge attack

An Entity of Type: Abstraction100002137, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away.

Property Value
dbo:abstract
  • In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. As long as the computer is safely behind a router or a firewall, there is nothing to worry about with this attack. With this attack, the adversary intends to prevent the system from operating normally, i.e. a denial of service. Configuring upstream network devices (including firewalls and routers) to ignore ICMP packets from the public Internet will make this almost certainly not succeed. (en)
dbo:wikiPageID
  • 8970838 (xsd:integer)
dbo:wikiPageLength
  • 1896 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 1082906990 (xsd:integer)
dbo:wikiPageWikiLink
dbp:date
  • September 2018 (en)
dbp:reason
  • Does the signature give away the identity of the program or the attacker? (en)
dbp:wikiPageUsesTemplate
dct:subject
rdf:type
rdfs:comment
  • In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. (en)
rdfs:label
  • Twinge attack (en)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is dbo:wikiPageRedirects of
is dbo:wikiPageWikiLink of
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License