1. Compromised Workstation Initiating ICMP Traffic
A user's workstation begins sending ICMP packets with varying sizes to an external server, suggesting data transfer or C2 communications.
2. Legitimate Network Scanner Activity
A network administrator runs diagnostic tools that generate ICMP traffic, triggering the detection. Investigation confirms benign activity.