Ch. 7 - Vocab Flashcards

1
Q

amplification attack

A

sending a packet with a spoofed source address for the target system to intermediaries, generating multiple packets from each original packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

availability

A

system being accessible and usable on demand by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

backscatter traffic botnet

A

echo response packets generated in response to a ping flood using randomly spoofed source addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

denial of service

A

compromise availability by hindering the provision of some service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

directed broadcast

A

an IP broadcast to all devices within a single directly-attached network or subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

distributed denial of service

A

the use of multiple systems to generate denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS amplification attack

A

exploiting the behavior of the DNS protocol to convert a small request into a much larger response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

flash crowd

A

where high traffic leading to a denial of service is a natural phenomenon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

flooding attack

A

to overload the network capacity on some link to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet Control Message Protocol

A

used internet devices to communicate error information or updates to other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP flood

A

flood of ICMP packets such as echo request packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

poison packet

A

packets whose structure triggers a bug in the system’s network handling software, causing it to crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

reflection attack

A

sends packets to an intermediary with a spoofed source address of the actual target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

slashdotted

A

as known as a flash crowded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

source address spoofing

A

using a forged source address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYN cookie

A

information about the connection is encoded in a cookie that sent as the server’s initial sequence number; this is sent in a SYN-ACK packet.

17
Q

SYN flood

A

similar effect as a SYN spoofing attack but the total volume of packets is the aim of the attack

18
Q

SYN spoofing

A

generates a very large number of syn connection request packets with forged source address, overwhelming the table of known TCP connections. The server is unable to respond to legitimate requests

19
Q

TCP

A

Transmission Control Protocol, providing reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network

20
Q

three-way TCP handshake

A
  1. Client system sends a SYN packet
  2. The server responds with a SYN-ACK packet
  3. The client sends an ACK packet marking connection as complete
21
Q

UDP

A

User Datagram Protocol, uses a simple connectionless communication model with a minimum of protocol mechanisms

22
Q

UDP flood

A

the overwhelming use of UDP packets directed to some port number, taking up some occupying capacity on the link to the server

23
Q

zombie

A

systems that are controlled by unauthorized users through the use of malware

24
Q

random drop

A

where the TCP connections table selectively drops an incomplete connection when it overflows, allowing a new connection to succeed