Chapter 7 Flashcards

1
Q

5th most costly form of attack for the respondents

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an action that prevents or impairs the authorized use of networks, systems, or application by exhausting resources.

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

categories of resources that could be attacked

A
  • Network Bandwidth
  • System Resources
  • Application Resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

relates to the capacity of the network links connecting a server to the wider Internet

A

Network Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The system can no longer communicate over the network until this software is reloaded

A

poison packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

examples of poison of death

A
  • ping of death

- teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • The aim of this attack is to overwhelm the capacity of the network connection to the target organization
  • Traffic can be handled by higher capacity links on the path, but packets are discarded as capacity decreases
  • Network Performance is noticeably affected
A

flooding ping command attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

flooding attack disadvantages

A
  • the source of the attack is explicitly identified

- the targeted system will attempt to respond to the packets being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • A common characteristic of packets used in many types of DoS attacks is the use of forged source address –> harder to identify and via raw socket interface
  • attacker generates large volumes of packets that have the target system as the destination address
  • Congestion would result in the router connected to the final, lower capacity link
  • Requires netwerk engineers to specifically query flow information from their routers
A
  • source address spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Common DoS attack
  • This attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connection
  • legitimate users are denied access to the server
  • an attack on system resources, specifically the network handling code in the OS
A

SYN spoofing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The standard protocol used for call setup in VoIP is the _____

A

Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers to an attack that bombards Web Servers with HTTP requests.

A

HTTP Floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • It exploits the common server technique of using multiple threads to support multiple requests to same server application
  • Eventually consumes Web Server’s connection capacity
  • Attempts to monopolize by sending HTTP requests that never complete
  • Utilizes legitimate HTTP traffic
  • Existing intrusion detection and prevention solution that rely on signatures to detect attacks will generally not recognize slowloris
A

Slowloris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • For most organizations this is their connection to their Internet Service Provider (ISP)
A
  • Network Bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aims to overload or crash the network handling software

A

System Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Typically involves a number of valid requests, each of which consumers significant resources, thus limiting the ability of the server to respond to requests from other users

A

Application Resources

17
Q

Advertise routes to unused IP addresses to monitor attack traffic

A

Backscatter traffic

18
Q
  • Classifies based on network protocol used
  • Intent is to overload the network capacity on some link to a server
  • Virtually any type of network packet can be used
A
  • ICMP Flood
  • UDP Flood
  • TCP/SYN flood
19
Q
  • Ping flood using ICMP echo request packets

- network administrators allow suck packets into their network because ping is a useful network diagnostic tool

A

ICMP flood

20
Q
  • Uses UDP packets directed to some port number on the target system
A

UDP flood

21
Q
  • Sends TCP packets to the targeted system

- Total volume of packets is the aim of the attack rather than the system code

A
  • TCP/SYN flood
22
Q
  • uses of multiple systems to generate attacks
  • Attackers uses a flaw in operating system or in a common application to gain access and installs their program ion it (zombie
  • Large collections of such systems under the control of one attacker’s control can be created, forming a botnet)
A
  • DDoS
23
Q

HTTP based attack

A
  • HTTP flood

- Slowloris

24
Q
  • attack that bombards Web servers with HTTP requests

- Consumes considerable resources

A

HTTP flood

25
Q

Bots starting from a given HTTP link and following all links on the provided Web site in a recursive way

A

Spidering

26
Q
  • Attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system
  • When intermediary responds, the response is sent to the target
  • “Reflects” the attack off the intermediary (reflector)
  • Goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary
  • The basic defense against these attacks is blocking spoofed-source packets
A

Reflection Attacks

27
Q
  • Use packets directed at a legitimate DNS server as the intermediary system
  • Attacker creates a series of DNS requests containing the spoofed source address of the target system
  • Exploit DNS behavior to convert a small request to a much larger response (amplification)
  • Target is flooded with responses
  • Basic defense against this attack is to prevent the use of spoofed source addresses
A

DNS Amplification Attacks

28
Q
  • Block IP directed broadcasts
  • Block suspicious services and combinations
  • Manage application attacks with a form of graphical puzzle (captcha) to distinguish legitimate human requests
  • Good general system security practices
  • Use mirrored and replicated servers when high-performance and reliability is required
A

DoS Attack Prevention

29
Q

Four lines of defense against DDoS attacks:

A
  • Attack prevention and preemption (before attack)
  • Attack detection and filtering (During the attack)
  • Attack source traceback and identification (During and after the attack)
  • Attack reaction (after the attack)