scholarly journals Internet Control Message Protocol

2006 ◽  
pp. 131-138
2022 ◽  
Vol 71 (2) ◽  
pp. 2315-2331
Author(s):  
Tengfei Tu ◽  
Wei Yin ◽  
Hua Zhang ◽  
Xingyu Zeng ◽  
Xiaoxiang Deng ◽  
...  

Author(s):  
Ali Gezer

Delay related metrics are significant quality of service criteria for the performance evaluation of networks. Almost all delay related measurement and analysis studies take into consideration the reachable sources of Internet. However, unreachable sources might also shed light upon some problems such as worm propagation. In this study, we carry out a delay measurement study of unreachable destinations and analyse the delay dynamics of unreachable nodes. 2. Internet Control Message Protocol (ICMP) destination unreachable Internet Control Message Protocol-Destination Unreachable (ICMP T3) packets are considered for the delay measurement according to their code types which shows network un reach ability, host un reach ability, port un reach ability, etc. Measurement results show that unreachable sources exhibit totally different delay behaviour compared to reachable IP hosts. A significant part of the unreachable hosts experiences extra 3 seconds Round Trip Time (RTT) delay compared to accessible hosts mostly due to host un reach ability. It is also seen that, approximately 79% of destination un reach ability causes from host un reach ability. Obtained Hurst parameter estimation results reveal that unreachable host RTTs show lower Hurst degree compared to reachable hosts which is approximately a random behaviour. Unreachable sources exhibit totally different distributional characteristic compared to accessible ones which is best fitted with Phased Bi-Exponential distribution.


Author(s):  
Qing Li ◽  
Tatuya Jinmei ◽  
Keiichi Shima

Author(s):  
Zhengrong Tao ◽  
Zhenxing Yin

In this paper, the authors present a method of measuring the switching time of a dual redundant NIC. The accuracy of the authors’ method of measuring switching time can reach milliseconds. The authors’ method uses Internet Control Message Protocol (ICMP) packets to test, is easy to operate, has high precision, and can be applied to all types of dual redundant device switching time measurement.


Author(s):  
Abidah Hj Mat Taib ◽  
Wan Nor Ashiqin Wan Ali ◽  
Nurul Sharidah Shaari

Handling Internet Control Message Protocol version 6 (ICMPv6) vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities by producing a threat model of ICMPv6 vulnerabilities and proposing the use of Selective Filtering ICMPv6 Messages (SF-ICMP6) to handle some of the vulnerabilities. An experiment was conducted to verify the threat model by observing and discussing the usage of ICMPv6 threat model together with SF-ICMP6. The findings showed that the attack derived in the threat model is possible and the countermeasure associated with it is appropriate. As for SF-ICMP6, selectively filtering messages should be enforced because different messages require filtering of different type and code. It is expected that with the use of threat model and SF-ICMP6, maintaining and securing ICMPv6 messages in IPv6 deployment is attainable.


Sign in / Sign up

Export Citation Format

Share Document