DDoS RIP Flashcards

1
Q

Coremelt attack

A

congest network by sending leg. traffic between bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crossfire attack

A

flood specific link to disconnect target from rest of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SCION Hidden path

A

Path that is not announced to core AS instead announce it only to selected entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCMP Authentication Host H in AS A sends to AS C

A
  1. First-level Key Exchange: AS C uses SVC to generate first level key KC→A = PRFSVC (“A”). AS C securely sends KC→A to AS A.
  2. Second-level Key Exchange: AS A generates a second-level key for H that can be used
    for source authentication by AS C, i.e., KSCMP = PRFK (“H|SCMP”) and gives it to C→A:H C→A
    host H.
  3. Host H authenticates its ICMP message using KSCMP . C→A:H
  4. AS C dynamically recreates KSCMP by retrieving the first-level key that it generated in C→A:H
    Step 1 and computing the second-level key that AS A computed. 5. Finally it verifies the authenticity of the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is communication flow with DRKey Kx->y

A

In opposite direction as key derivation. Burden lies on sender of the message, receiver can just derive key to verify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Colibri

A

Colibri allows hosts to reserve end to end paths between each other with guar- anteed bandwidth. This solves the DDoS problem as the legitimate path is guaranteed at least some bandwidth. In order to reserve a path, first each segment needs to be reserved by the source AS, and then these reserved segments are used to exchange packets to set up the whole e2e path reservation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Admission Control Algo of colibri prevents:

A
  • A single AS congests a link by requesting multiple different paths that traverse it.
    • A group of ASes, controlled by the same attacker, can reserve too many paths going through the same link.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EPIC

A

Every packet is checked:

  • duplicate suppression with bloom filter
  • per packet source auth. with DRKeys
  • per packet variable hop fields, include packet creation time -> prevents brute force of hop fields MAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly