Lec 15: Network Security II: Denial of Service (DoS) and DNS Flashcards
What is a denial-of-service attack? What are the two types?

How is the first step of DOS done?

How is the second step of DOS done?

How is the third step of DOS done?

How is the fourth step of DOS accomplished?

How is the fifth step of DOS accomplished?

How prevelant are DOS attacks?

How did UCSD find a good estimate for how prevelant are DOS attacks?

How did UCSD’s way of finding how many DOS attacks work?

How does random IP spoofing produce random backscatter?

How do you analyze backscatter?

What is victim characterization by DNS name/

Who is a target to DOS?

What to do against DOS attacks?

How do you prevent address spoofing with filtering and SYN cookies?

How do you prevent address spoofing with Puzzles and CAPTCHAs?

How do you prevent address spoofing with TTL filtering?

How do you prevent address spoofing with traceback?

How do you prevent address spoofing with packet filtering?

How can you prevent DOS with buying more resources?

What are the two types of modern DoS?

What is a reflection attack?

Why is DoS such a hard problem to solve?

Why do we use DNS?













