Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks


With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.

Share and Cite:

Junior, R. and Kumar, S. (2014) Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks. Journal of Information Security, 5, 123-135. doi: 10.4236/jis.2014.53012.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Mirkovic, J., Dietrich, S., Dittrich, D. and Reiher, P. (2013) Understanding a Denial of Service Attack.
[2] Arbor Networks (2014) Worldwide Infrastructure Security Report.
[3] (2013) DDoS Attacks Against Government and Entertainment Websites Escalate.
[4] (2014) OS X Lion—The World’s Most Advanced Desktop Operating System.
[5] (2014) Apple’s Lion Roars onto Computers with 1 Million Downloads in a Day. The Independent (UK).
[6] (2013) Why You’ll Love a MAC.
[7] Nash, M. (2014) Why 7? The Windows Blog. Microsoft.
[8] Wikipedia (2014) Windows 7.
[9] Postal, J. (1981) Report for Comments for ICMP, RFC 792.
[10] (1989) RFC 1122—Requirements for Internet Hosts—Communication Layers.
[11] Surisetty, S. and Kumar, S. (2010) Is Apple’s iMac Leopard Operating System Secure under ARP-Based Flooding Attacks? IEEE Proceedings of the 5th International Conference on Internet Monitoring and Protection, Barcelona, 9-15 May 2010, 60-64.
[12] Surisetty, S. and Kumar, S. (2010) Is McAfee Security Center/Firewall Software Providing Complete Security for Your Computer? 4th International Conference on Digital Society, St. Maarten, 10-16 February 2010, 178-181.
[13] Surisetty, S. and Kumar, S. (2012) Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks. IEEE Security & Privacy, 60-64.
[14] Gade, R.S.R., Vellalacheruvu, H. and Kumar, S. (2010) Performance of Windows XP, Windows Vista and Apple’s, Leopard Computers under a Denial of Service Attack. 4th International Conference on Digital Society, St. Maarten, 10-16 February 2010, 188-191.

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.