Abstract:In this paper, the encapsulation of ICMP packets and the specifications of IP packet, ICMP packet and UDP packet are introduced. At the angle of the protocol analysis, a ICMP attack case is described the characters of attack are abtained and the corresponding countermeasures are presented.