Exam 2: Lesson 9 Flashcards

1
Q

Lesson 9:

Determine which property of secure communication is violated in the event that a third-party pretends to be another entity on the network.

Group of answer choices

Confidentiality

Integrity

Authentication

Availability

A

Authentication

  • When two parties are communicating, it is important to ensure that the two parties are who they say they are.
  • For example, an intruder may try to steal information by impersonating another entity on the network. As a countermeasure against these attacks we use authentication mechanisms to verify the identity of a user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lesson 9:

Determine which property of secure communication is violated in the event that Trudy is able to access and modify the contents of a message between Alice and Bob. Select all that apply.

Group of answer choices

Confidentiality

Integrity

Authentication

Availability

A

Both are correct below:

Confidentiality

  • We want to ensure that the message that is sent from the sender to the receiver is only available to the two parties.
  • An attack scenario is that we have an intruder that can eavesdrop on the communication by sniffing or recording the exchanged messages.
  • One measure to increase the chances that a communication is confidential is to encrypt the message so that even if the communication is intercepted, the message would be meaningless to the attacker.

Integrity

  • It is important to ensure the message has not been somehow modified while in transit from the sender to the receiver.
  • For example, an intruder could attack by modification, insertion or deletion of part of the messages send. As a countermeasure, we can introduce mechanisms that check for the integrity of the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lesson 9 (T/F):

Round Robin DNS (RRDNS) is one of the “tools” that malicious parties can use to extend the time their content is accessible/hosted on the Internet.

A

True

Attackers have developed techniques abusing the DNS protocol so to extend the uptime of domains that are used for malicious purposes (e.g. Command and Control hosting infrastructure, phishing, spamming domains, hosting illegal businesses, illegal content). The ultimate goal of this abuse is to remain undetectable for longer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lesson 9 (T/F):

Fast-Flux Service Networks (FFSNs) can be leveraged by malicious actors to extend the availability of a scam.

A

True

  • The previous two strategies (Round Robin and DNS based Content Delivery) provide reliability, scalability and resilience, which is great for larger websites. However, this also benefits spammers.
  • Since using these techniques, a DNS request receives multiple A records (each containing a different IP address), this makes it harder to shut down online scams, as if even one IP address is functional, the scam is still working.
  • Similarly, spreading across several servers makes the shutdown of these scams more complex!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lesson 9 (T/F):

Using the fast flux technique to extend the availability of a scam domain name, it makes it impossible for the scam to be taken down.

A

False

Similarly, spreading across several servers makes the shutdown of these scams more complex!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lesson 9:

What is the main qualitative difference between rogue and legitimate networks?

Group of answer choices

The persistence of malicious behavior

The type of malicious behavior (e.g. scam hosting, Command and Control servers hosting etc.).

A

The persistence of malicious behavior

From notes:

  • The key difference between rogue and legitimate networks is the longevity of malicious behavior.
  • Legitimate networks are usually able to remove the malicious content within a few days whereas rogue networks may let the content be up for weeks to more than a year!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lesson 9 (T/F):

The FIRE system takes primarily a reactive approach to infer network reputation, relying on monitoring IP blacklists.

A

True

  • With data plane monitoring only if a network has a large enough concentration of blacklisted IPs it will be flagged as malicious. We flag a network as malicious only after we have observed indications of malicious behavior for a long enough period of time.
    • For example, let’s say we have access to a blacklist and we observe a large number of IPs that belong to an AS to be blacklisted for spamming, phishing, hijacking, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lesson 9 (T/F):

ASwatch takes primarily a proactive approach to infer network reputation by monitoring the routing behavior of networks.

A

True

This topic discusses a complementary approach – ASwatch which uses information exclusively from the control plane (ie. routing behavior) to identify malicious networks. Also, this approach aims to detect malicious networks that are likely run by cyber actors, or bulletproof as they are called, rather than networks that may be badly abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lesson 9:

How can a rogue network remain undetected by ASwatch (stay under the radar)?

Group of answer choices

By switching frequently to a different upstream provider.

By lowering the ratio of malicious IP addresses to the total owned IP addresses.

By maintaining a stable control plane behavior.

A

By maintaining a stable control plane behavior

  • These networks shown as red in the figures are found to be changing upstream providers more aggressively than most legitimate networks, also they are found to behave customer-provider or peering relationships with likely shady networks, rather than connecting with directly with legitimate networks.
  • These behaviors help the bulletproof network to remain unnoticeable for longer, and when complaints may start, the bulletproof network can simply change an upstream provider.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lesson 9:

Determine which system monitors routing behavior to determine the legitimacy of a network.

Group of answer choices

FIRE

ASwatch

ARTEMIS

Stellar

A

ASwatch

ASwatch which uses information exclusively from the control plane (ie. routing behavior) to identify malicious networks. Also, this approach aims to detect malicious networks that are likely run by cyber actors, or bulletproof as they are called, rather than networks that may be badly abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Lesson 9:

Determine which system uses routing behavior to detect BGP hijacking attacks.

Group of answer choices

FIRE

ASwatch

ARTEMIS

Stellar

A

ARTEMIS

ARTEMIS is a system that is run locally by network operators to safeguard its own prefixes against malicious BGP hijacking attempts. The authors of the ARTEMIS paper (Sermpezis et al) describe a self-operated manner of prefix hijacking detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lesson 9 (T/F):

BGP Blackholing is a defense against prefix hijacking.

A

False

BGP blackholing, that is a countermeasure to mitigate a DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lesson 9 (T/F):

The BGP blackholing technique can only be applied for traffic related to specific applications.

A

False

One of the major drawbacks of BGP blackholing is that the destination under attack becomes unreachable since all the traffic including the legitimate traffic is dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lesson 9:

Consider the reflection and amplification attack as shown in the figure below.

reflection-amplification

Which IP address is being spoofed in this attack?

Group of answer choices

IP Address of the Victim

IP address of the Reflector

IP address of the Master

IP address of the Slaves

A

IP Address of the Victim

See screenshot in notes

Here, the master directs the slaves to send spoofed requests to a very large number of reflectors, usually in the range of 1 million. The slaves set the source address of the packets to the victim’s IP address, thereby redirecting the response of the reflectors to the victim. Thus, the victim receives responses from millions of reflectors resulting in exhaustion of its bandwidth. In addition, the resources of the victim is wasted in processing these responses, making it unable to respond to legitimate requests. This forms the basis of a reflection attack. Let’s consider the below figure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lesson 9:

Suppose that you are designing a detection system to detect DNS reflection and amplification attacks. To accomplish that you need access to:

Group of answer choices

Control plane data

Data plane data

Both control plane and data plane data

A

Data plane data

??? Get the reasoning for this!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lesson 9:

Suppose that you are designing a detection system to detect BGP hijacking attacks (specifically BGP path and prefix attacks). To accomplish that you need access to:

Group of answer choices

Control plane data

Data plane data

Both control plane and data plane data

A

Control plane

The design of ASwatch is based on monitoring global BGP routing activity to learn the control plane behavior of a network. The system has two phases:

The design of ASwatch is based on monitoring global BGP routing activity to learn the control plane behavior of a network.

ASwatch which uses information exclusively from the control plane (ie. routing behavior) to identify malicious networks. Also, this approach aims to detect malicious networks that are likely run by cyber actors, or bulletproof as they are called, rather than networks that may be badly abused.

17
Q

Lesson 9:

Which of the following techniques can help an attacker to attract more traffic when attempting to hijack a prefix? Select all that apply.

Group of answer choices

Advertise a more specific prefix than the original owner AS

Advertise a shorter path to the prefix.

Advertise the same path as the original owner AS but change the origin AS.

A

Advertise a more specific prefix than the original owner AS

Advertise a shorter path to the prefix.

a. Exact prefix hijacking:When two different ASes (one is genuine and the other one is counterfeit) announce a path for the same prefix. This disrupts routing in such a way that traffic is routed towards the hijacker wherever the AS-path route is shortest, thereby disrupting traffic.

b. Sub-prefix hijacking: This is an extension of exact prefix hijacking, except that in this case, the hijacking AS works with a sub-prefix of the genuine prefix of the real AS. This exploits the characteristic of BGP to favor more specific prefixes, and as a result route large/entire amount of traffic to the hijacking AS.

Example: A given hijacking AS labelled AS2 announces that it has a path to prefix 10.10.0.0/24 which is a part of 10.10.0.0/16 owned by AS1.