Ping flood attack simulation and defense
This project demonstrates how to simulate, detect, and mitigate a DenialโofโService (DoS) attack using ICMP ping floods against an Ubuntu Server.
The lab environment was designed to showcase both offensive testing and defensive hardening techniques.
- Simulate ICMP ping flood attacks to study DoS behavior.
- Capture and analyze abnormal traffic patterns with Wireshark.
- Ingest system and network logs into Splunk for centralized monitoring.
- Configure custom Splunk alerts to detect flooding activity.
- Implement iptables firewall rules to limit ICMP requests and mitigate attack impact.
- Ubuntu Server โ Target environment
- Wireshark โ Packet capture and traffic analysis
- Splunk โ Log ingestion, dashboards, and alerting
- iptables โ Linux firewall for traffic control
- VirtualBox โ Lab virtualization environment
- Used
pingwith high frequency to generate ICMP flood traffic