In the Denial of Service Attacks lecture, the ping flooding attack was used to illustrate concepts used by many DoS attacks. Some demonstrations were also given, showing a simple ping flooding attack in a virtual network.
In this exercise you should try to re-create the ping flooding attack in your own virtual network. Detailed examples of how to setup the virtual network and configure the nodes in preparation of an attack are here (also a printable PDF). Once setup, try the attack, and investigate different configurations. For example, different ping intervals and sizes, different number of reflectors, broadcast ping vs multiple individual pings, vary the capacity of the link to the target, and so on.
To do this exercise you need to use virtnet. Do not perform any attack in a real network. You also need some knowledge of ping and ICMP.