Not sure where you got that info - but it sure an the hell has nothing to do with a HOME setup. Here is the thing, as already mentioned I highly doubt your under a ddos or even a dos.
But sure lets get some info, btw running any commands on your PC behind a nat router is not going to show you much, unless you have put your machine in the dmz, or they were sending traffic to a port you forwarded for some reason?
Lets look at this simple layout.
internet - isprouter - yourrouter - pc
So you want to talk to the internet from your pc(s) you talk to your router off your local network, common 192.168.x.x (rfc1918) it changes it to your public IP and sends it on to your isp router, who then sends it on to the next router that is listed via a routing table to get where your going, lets say google. Your http request gets to google, they send you back the answer to your publicIP:port.. Your router says yup I did request that info and sends it back to your pc.
Now someone knows your IP, they start a ddos, dos to your IP sending your loads and loads and loads of traffic.. Your router is going to say nope, didn't request that, nope didnt request that, etc.. and just not even answer the packet. So normally to take you offline or slow you down they would have to fill up the connection speed you have between your router and your isprouter. So you looking at your PC would show you nothing. You need to look at your router to see this traffic.
So to get this info - what is your router, its most likely not even capable of given you info that would tell you your even under any sort hit... Can you actually view the firewall logs of your router?
Something like this?
Most soho routers will not show any sort of detail of the traffic it dropped. So depending on what router you have we can take a look see.. Or you could connect your PC directly to your modem so we could see.. That is if you actually have a modem, and not a gateway modem router combo. If your cable and have an actual modem, and then a router behind it we could see what is going on by connecting your pc directly to the internet via the modem so you get a real publicIP.. Then as mentioned sure wireshark would show you all the traffic your PC is seeing.
But as mentioned changing the mac of the device to your modem will most likely get you a new public IP.. Many soho routers have a clone mac option, change one of the last number by one and renew your lease, reboot your router and see if you get a different public.. There should be no reason why you should not - since dhcp works based upon mac, your old mac had a different lease, so new mac should get you new IP.. There you go possible ddos gone.
If you let us know the details of your modem/router -- any model numbers of devices connected before your PC and I will be happy to help you figure out if your being ddosed.
But turning of icmp isn't going to fix anything, but sure unless you play games that check your IP for response time you most likely have no use for it to be on. Unless you remotely check if your network is up?
If we are lucky and your router does post your drops like mine -- post up a snip.. If your not seeing 1000's, I mean 1000's of drops a second your NOT under anysort of attack and it is just the typical noise you see on the net, like my above examples.
Now back to my oven drawing of how your connected.. There is no command you could do on your router, even if the fancy 50k$ highend model that could stop a true ddos from filling up your connection. And taking you offline, or making everything really really slow.
Lets say you have a 100Mbps connection to your isp -- if they send 100Mbps to your IP.. Be it your router drops it without breaking a sweat, your connection is still full and your request to google is going to have a hard time getting through, and when it does the answer will be just as hard to get back to you.
To stop an dos/ddos you need to change your IP so the attackers don't know where you are any more, and the traffic does not go down your connection any more. Or up the stream from you, say the isp router they need to stop the traffic from going down your connection. So then stuff like blocking netblocks from talking to you could slow down the attack.. But more than likely the way you stop the attack is look into the specific of the traffic they are sending and drop on something in that packet vs just source IP/network or dest port since they could be sending you traffic to random ports.. But sure if all to Port X they could block the traffic that way.
But again it has to be done upstream from your router.. Unless the attack is something very basic and just overloading your routers ability to drop packets and not coming anywhere close to filling up your pipe.
Your best bet if you truly believe your under attack is call your isp and give them your story, ask them to change your IP. Or check the traffic on your connection for any sort of attack.