(c) Ping Flooding Attack
While no longer a practical DDoS attack, a Ping flooding attackdemonstrates many features of DDoS attacks today. Provide atechnical description of how a Ping flooding attack occurs. Youmust include a diagram illustrating an attack scenario (the diagrammay be a modification of that used in the previous section), andprovide a written explanation of the attack. You are expected torefer to the protocols used, steps of a successful attack, entitiesinvolved, and what resources are targeted.
Expert Answer
An answer will be send to you shortly. . . . .