11 - Network Security Flashcards

1
Q

Why do we need network security?

A

Attacks:

  • Routing (BGP)
  • Naming (DNS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reasons Internet’s Design is Insecure

A
  • Designed for simplicity
  • “On by default”
  • Hosts are insecure
  • Attacks can look like “normal” traffic
  • Federated design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet-switched networks are vulnerable to

A

resource exhaustion attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of Security

A
Availability: ability to use a resource
Confidentiality: concealing information
Authenticity: assures origin of information
Integrity: prevent unauthorized changes
Threat: potential violation
Attack: action that violates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of Service Attack ? (Component)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control plane authentication (Routing Security)

A
  • Session: point-to-point b/w routers
  • Path: protects AS path
  • Origin: ensures that AS advertising prefix is the owner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A route hijack is an attack on the following form of authentication:

A

Origin, because in a route hijack, the AS that is advertising the prefix is actually not the rightful owner of that prefix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How? (Attacks on Routing)

A
  • Config error
  • Routers compromised
  • Unscrupulous ISPs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Attack

A
  • Config/Management software
  • Tamper w/software
  • Tamper w/ routing data

Most common: “Hijack”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS masquerading

A

Attack whereby an attacker can use the BGP infrastructure to hijack a DNS query and masquerade as a legitimate service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AS-path poisoning

A

Make sure hijacked route is not accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session Authentication

A

Ensure BGP routing messages sent between routers between ASs are authentic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Guaranteeing Origin & Path Authentication

A

“Secure BGP” (BGPSEC)

Origin Attestation (Address Attestation): Certificate binding prefix to owner (signed by trusted party)

Path Attestation: Signatures along AS path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Path Attestation prevents against:

A

Hijacks
Shortening
Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Path Attestation cannot prevent against:

A

Suppression

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is DNS Vulnerable?

A
  • Resolvers trust responses
  • Responses can contain info unrelated to query
  • NO AUTHENTICATION
    Connectionless (UDP)
17
Q

Which aspects of DNS make it vulnerable to attack?

A

Queries over UDP

No authentication for query responses

18
Q

Defense against DNS cache poisoning

A
  1. Query ID + Randomization (Can be guessed)
  2. Source port randomization (resource intensive and NAT can derandomize)
  3. “0X20” encoding -> DNS is case insensitive
    (attacker would have to guess ID and also capitalization)
19
Q

Why does 0x20 make DNS more secure?

A

Additional entropy

20
Q

DNS Amplification Attack

A
  • Exploits asymmetry in size b/w queries & responses
21
Q

DNSSEC Protocol

A
  • Adds authentication to DNS responses simply by adding signatures to the responses that are returned for each DNS reply.