Lec 15: Network Security II: Denial of Service (DoS) and DNS Flashcards
1
Q
What is a denial-of-service attack? What are the two types?
A
2
Q
How is the first step of DOS done?
A
3
Q
How is the second step of DOS done?
A
4
Q
How is the third step of DOS done?
A
5
Q
How is the fourth step of DOS accomplished?
A
6
Q
How is the fifth step of DOS accomplished?
A
7
Q
How prevelant are DOS attacks?
A
8
Q
How did UCSD find a good estimate for how prevelant are DOS attacks?
A
9
Q
How did UCSD’s way of finding how many DOS attacks work?
A
10
Q
How does random IP spoofing produce random backscatter?
A
11
Q
How do you analyze backscatter?
A
12
Q
What is victim characterization by DNS name/
A
13
Q
Who is a target to DOS?
A
14
Q
What to do against DOS attacks?
A
15
Q
How do you prevent address spoofing with filtering and SYN cookies?
A