Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

F-L

What is an ICMP Flood DDoS Attack?

An Internet Control Message Protocol (ICMP) flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). Normally, ICMP echo-request and echo-reply messages are used to ping a network device in order to diagnose the...

An Internet Control Message Protocol (ICMP) flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). Normally, ICMP echo-request and echo-reply messages are used to ping a network device in order to diagnose the health and connectivity of the device and the connection between the sender and the device. By flooding the target with request packets, the network is forced to respond with an equal number of reply packets. This causes the target to become inaccessible to normal traffic.

What is Identity?

The set of attribute values (i.e., characteristics) by which an entity is recognizable and that, within the scope of an identity manager’s responsibility, is sufficient to distinguish that entity from any other entity.

What is IDS Data?

Refers both to raw data collected by the TOE and to the results of analysis applied by the TOE to that data.

What is IIoT?

IIoT refers to a subcategory of the broader Internet of Things. IoT includes IIoT plus things like asset tracking, remote monitoring, wearables, and more. IIoT focuses specifically on industrial applications such as manufacturing or agriculture.

What is Impact?

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.

What is Impact Level?

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability. High Impact: The loss of confidentiality, integrity, or availability could be expected to...

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.

High Impact: The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic impact on the mission or core services of the entity, meaning, for example: priority services cannot be delivered; major damage to assets or financial loss will occur; or the imminent threat of loss of life or serious life-threatening injuries exists.

Moderate Impact: The loss of confidentiality, integrity, or availability could be expected to have a serious adverse impact on the mission, core services and/or supporting services of the entity, meaning, for example: significant degradation in service delivery is expected; significant damage to assets or financial loss will occur; or the potential for non-life-threatening injuries exists.

Low Impact: The loss of confidentiality, integrity, or availability could be expected to have a limited adverse impact on the services of the entity, meaning, for example: limited degradation in service delivery impacting efficiency or effectiveness; minor damage to assets or limited financial loss; or minor harm to individuals.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.