Browse Definitions :
Definition

ping strangeness

Ping strangeness is a term used in troubleshooting to describe the incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a specific network node or an unusual number of error messages returning.

Ping (Packet Internet Groper) is a utility program that allows a user or program to verify that a particular IP address exists and can accept requests. Ping can be used as an alternative to the traceroute utility to troubleshoot network connectivity and latency issues. It is faster than traceroute and generates less network traffic.

When a user issues a ping request, the program formats an ICMP ECHO_REQUEST packet and sends it to a designated target address. If the remote IP address is active, it responds with an ICMP ECHO_REPLY packet. Ping then uses the timestamp of the Echo Reply to calculate a round-trip time and gauge response time.

If the target address is unavailable or something else is not working normally, Ping will report an error. Common errors include Destination Unreachable, Unknown Host and Request Timed Out.

When there is an unusual pattern of ICMP ECHO_REPLY packets being sent to the same server in the same time period, or there is an unusual number of error messages, this "strange" pattern is worth investigating. It could be that Ping is being used to carry out a denial of service attack (DoS) or look for attack vectors.

This was last updated in September 2017

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close