(3) Detecting DoS and DDoS attacks Flashcards

1
Q

How can a DoS attack from a single device be stopped?

A

A DoS attack from a single device can easily be stopped by blocking that device from accessing a network by way of a firewall or other device

IPs can also block attack traffic that is known, stopping the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How likely are single system DoS attacks?

A

Single system DoS attacks are not as likely unless the target is vulnerable to a particular service or app weakness or can be easily overtaken by a single system due to limited resources/bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When it comes to DDoS attacks, what types of tools and systems are needed or are useful?

A

When it comes to DDoS attacks, these technologies can be very useful:

Performance monitoring tools

Connection monitoring through local sys or app logs

Network Bandwidth or sys bandwidth monitoring

Dedicated tools like IDSs, IPSs with DoS and DDoS detection turned on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For other less common attacks, what tools are useful?

A

For other less common attacks, they tools are useful:

-Using an IDS or IPS

-Monitoring flows, SNMP, etc

-Feeding logs from firewalls, routers, switches, and other network devices to a central log analysis/monitoring system

-an SIEM device configured to review and auto alarm problem traffic

-Deploy host level tools such as endpoint detection and response (EDR) to monitor network behavior at endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are effective ways of detecting rogue devices on the network?

A

Effective ways of detecting rogue devices include:

-Valid MAC Address checking

-Mac Address Vendor Information Checking

-Network Scanning

-Site Surveys

-Traffic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Valid MAC address checking, MAC Address Vendor Information Checking, and network scanning in terms of rogue device detection

A

In terms of rogue device detection:

-Valid MAC Address checking uses hardware MAC Addresses reported to the network to determine if the devices are valid compared to a list of known devices

-MAC address Vendor Information Checking is where one uses the vendor prefix of a MAC Address to determine if the device is valid

Network Scanning uses tools such as nmap to detect unknown devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of rogue device detection, describe site surveys and traffic analysis

A

In terms of rogue device detection,

-Site surveys involve physically examining devices on site to verify MAC addresses

-Traffic Analysis involves using tools such as Wireshark to determine if a device belongs on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of networks are easy targets for wired rogue devices?

A

These types of networks or situations are easy targets for wired rogue devices:

-Networks that don’t have access controls like port security

-Networks that don’t use Network Access Control (NAC) technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the most like types of wired rogue devices?

A

The most likely types of rogue devices are these:

-An employee or well known member of an org connects a device without permission of IT

-An attacker has connected a device to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can bad actors overcome security that is based on MAC addresses to connected a wired device to a network?

A

Bad actors can overcome MAC address based security tools by engaging in MAC Address spoofing, whereby the attacker replaced their MAC Address with a known good MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the challenge with wireless rogue devices and how is it overcome?

A

The challenge with wireless rogue devices is that one can’t easily physically locate them.

This limitation can be overcome by using signal strength measures and mapping the area where the rogue is or:

if the wireless rogue does physically connect, one can use operating system identification to locate the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly