11. Network security Flashcards

1
Q

Why do we need network security?

A

Attacks: Routing, Naming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet is by design insecure/secure?

A

insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any host is on by default for other hosts to connect

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet switched networks are vulnerable to ______ attacks

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Components of security

A

Availability
Confidentiality
Authenticity
Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

availability

A

ability to use resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

concealing information (Bank account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authenticity

A

assures origin of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

prevents unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Threat definition

A

Anything that is a potential violation of the components of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Attack definition

A

action that results in a violation of the components of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack on confidentiality

A

Eavesdropping - listening to people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Negative impacts of attacks

A

theft of confidential info
unauthorized use
false info
disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control plane authentication

A

Session: point-to-point b/w routes
Path: protects AS paths
Origin: ensures that AS advertising prefix is the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Route Attacks: How?

A

configuration error (accident)
router compromised by attacker
unscrupulous isp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

types of attacks

A

Configure router/ management softwar
tamper with software
tamper with routing message

17
Q

Most common type of attack

A

router hijack

18
Q

Origin Attestation

A

Certificate binding prefix to owner

19
Q

Path attestation

A

signatures along AS path

20
Q

Why is DNS vulnerable

A

Resolvers trust responses
Responses can contain info unrelated to query
NO authentication

21
Q

DNS Cache Poisoning

A

so resolver requests a thing, attacker sends a fuckton of stuff to recursive solver handling the thing hoping to match before the legit source resolves the thing.

Now the recursive resolver caches the attackers response instead of the legit one

22
Q

DNS Cache Poisoning Defenses

A
  1. Query ID (can be guessed though)
  2. Randomize ID
  3. Source port randomization
  4. 0x20 Encoding
23
Q
  1. Source port randomization PROBLEM
A

resource intensive

NAT can derandomize

24
Q

0x20 Encoding

A

DNS is case insensitive

25
Q

DNS amplification attack

A

exploits asymmetry in size between queries and responses

Attacker sends requests to DNS resolver at a size of 60 bytes with the src as the victim. So the dns resolver sends the response to the actual victim but the response is 3000 bytes

26
Q

DNS amplification attack - Defenses

A

Prevent spoofing

Disable open resolvers