$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!


Discuss about the Internet Control Message Protocol.



A campus network refers to a proprietary LAN (local area network) or a set of LAN’s that are interconnected that serve bodies such as corporation, government agencies, or educational institutions such as universities. The campus is a set of buildings in close proximity to each other although the end users can be dispersed more widely (geographically) but using a single LAN but they are not scattered as wide as would be in a WAN (wide area network) (Rouse, 2016). Campus Networks can be a target of various attacks; this paper discusses some possible attacks and their solutions

This is an attack type where the IP (Internet protocol) broadcast addressing is exploited and the victim is flooded with ICMP (Internet Cntrol Message Protocol) ping (echo) replies sent from another network. Using a Smurf program, attackers cause the attacked network section to become inoperable; the attack depends on an intermediary to broadcast ICMP ping packets to hosts on the target subnet within a campus network. The Smurf program creates a legitimate network packet that appears to have originated from another address; it has an ICMP ping message addressed to all IP addresses in the campus network. On arrival at the target subnet, the ICMP ping request packet is converted into a Layer 2 broadcast and then sent to connected hosts (Barrett, 2010).

The attack only becomes possible if the device (router) in a layer 2 subnet has directed forwarding of broadcasts enabled, so disabling this will stop the flooding with ICMP ping replies.  Another solution is placing a box switch with the capability of DHCP snooping to discard invalid packets as a core switch within the campus network. An example is the Huawei S 6700 advanced switch (Barrett, 2010).


Cisco Discovery Protocol (CDP) Attacks

CDP is a commonly used tool by technicians to create a network documentation that is usually enabled by default in most switches. This can be attacked through a technique called CDP spoofing on Cisco routers, switches, or other network equipment y creating forged CDP packets impersonating other devices to compromise a campus network’s operation.  And this is incredibly easy to achieve; a hacker with Kali Linux can easily spoof the CDP and compromise a network just by starting the Yersinia program in Kali Linux and clicking attack; the switch will crsh and reboot in minutes, greatly disrupting the campus network (Vonnie, 2015).

This attack can be prevented/ mitigated by placing all switch ports that are not being used in a dummy VLAN (Virtual LAN) and enable admin down. Another approach entails disabling CDP on switches and swicthports that do not need it (CDP); for instance, access points that only have an IP phone or a computer; these do not need CDP to function. The third approach is to configure proper port security on ports that cannot be disabled; using the command

Where n is the number of MAC’s so a limit can be set to say 5; this will effectively limit the number of addresses and even if Yersinia launches a flood of addresses, the switch will essentially place the port on a state of secure shutdown, preventing network interruption. In this case, the access to a switchport is confined to a specified layer 2 MAC address and this will not permit the Kali box with Yersinia to launch a CDP attack (Heygele, 2014)


Attacks to campus networks can cause great harm; some of the common and potentially destructive attacks include Smurf attacks where ICMP ping packets are used to flood a victim. This can be mitigated by disabling directed forwarding of broadcasts. Another attack that can target a layer 2 device is CDP attacks that are incredibly easy to achieve; this is mitigated by  enabling switch port security



Barrett, D. (2010). CompTIA security+ SY0-201 practice questions exam cram: Exam SY0-201. [Indianapolis, Ind.], Pearson Education.

Heygele, R., 2014. Protect your network against CDP attacks! [online] Infra Blog. Available at: <> [Accessed 2 May 2017].

Rouse, M., 2016. What is campus network? - Definition from [online] Tech target. Available at: <> [Accessed 29 Apr. 2017].

Vonnie, B., 2015. Destroying a Cisco Switch with CDP Flooding. [online] fixedByVonnie. Available at: <> [Accessed 2 May 2017].


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Internet Control Message Protocol. Retrieved from

"Internet Control Message Protocol." My Assignment Help, 2018,

My Assignment Help (2018) Internet Control Message Protocol [Online]. Available from:
[Accessed 04 April 2020].

My Assignment Help. 'Internet Control Message Protocol' (My Assignment Help, 2018) <> accessed 04 April 2020.

My Assignment Help. Internet Control Message Protocol [Internet]. My Assignment Help. 2018 [cited 04 April 2020]. Available from:

For years now, is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.

Latest Management Samples

BUS1007 Organisational Behaviour

Download : 0 | Pages : 8
  • Course Code: BUS1007
  • University: Australian Institute Of Higher Education
  • Country: Australia

Answer: The behaviour of human beings are full of intricacies and it is highly difficult to understand or apprehend it. There are several factors that join together for determining some peculiar kinds of patterns for the employees’ behaviour in all organisation. There are certain employees who are coarse, some are amiable, some are stone hearted and many are soft hearted. Also, there are some who are empathetic or apathetic and on the ot...

Read More arrow

COMM1410 Letter For Social Media For The Virtual World

Download : 0 | Pages : 2

Answer: Claire Smithfield Lots of Stuff Park 32/A Kitchner, 45660  Subject: Regarding Use Of Social Media  Dear Claire, I hope this letter finds you in good health. We received your notification regarding the use of social media and how you feel concerned for our health. I must say, on behalf of all the employees, that this was a very thoughtful gesture on your part. This makes us feel especially wanted in the company. Of the p...

Read More arrow

MGT03 International And Local Market For Seistrand Systems

Download : 0 | Pages : 5

Answer: HBR Case Study The main conflicting issue in this given case study is based on hiring an international talent, Anne Prevost. Being particularly a German-based organisation Typware, the organisation needs to recruit a new talent which can be beneficial for the organisational current competitive market. The international and local market is different from each other. For specific, the candidate wants to settle down in Europe. The h...

Read More arrow

LAW6CON Construction Law For Negligence, Contract And Guarantees

Download : 0 | Pages : 12

Answer: Part 1 Construction Law has evolved as an area of law dealing with disputes that arises in relation to the construction of buildings and other similar fields. It has been developed by bundling the laws relating to commercial law, contract law, planning law, tort law and employment law. This branch of law includes issues like negligence, contract, guarantees, claims and other similar areas of laws relating to construction (Manderson, J...

Read More arrow

GSB019 Analysis Of Change Triggers For Regional Pharmaceutical Manufacturer

Download : 0 | Pages : 9
  • Course Code: GSB019
  • University: Australian Institute Of Management
  • Country: Australia

Answer: Introduction  This report has aimed to examine a strategic change initiative in the given organization in the case study. In this given report, Algorithm Sal has been chosen as the organization, which is a regional distributor of pharmaceutical products in Middle East, Near East, east Europe and North Africa. The organization had acquired Merck& Co. in an attempt to become the manufacture of products by establishing manufacturi...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Thank you so much for your efforts the solution was perfect and submitted on time.


User Id: 371975 - 03 Apr 2020


student rating student rating student rating student rating student rating

every thing good and Very classy treatment. thank you very much i hope do my thesis with this web


User Id: 396340 - 03 Apr 2020


student rating student rating student rating student rating student rating

The work was well present, details and met all expectations. This is a prove that I will always use this platform and recommend this site to friends at schools and family. Keep using great people to keep having users. Just after receiving this assign...


User Id: 203000 - 03 Apr 2020


student rating student rating student rating student rating student rating

good transcript that it make feel good because i don\'t need to worry about no ideas to write this transcript


User Id: 329158 - 03 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?