Lec 15: Network Security II: Denial of Service (DoS) and DNS Flashcards

1
Q

What is a denial-of-service attack? What are the two types?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the first step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the second step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is the third step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is the fourth step of DOS accomplished?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the fifth step of DOS accomplished?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How prevelant are DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How did UCSD find a good estimate for how prevelant are DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How did UCSD’s way of finding how many DOS attacks work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does random IP spoofing produce random backscatter?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you analyze backscatter?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is victim characterization by DNS name/

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is a target to DOS?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What to do against DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you prevent address spoofing with filtering and SYN cookies?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you prevent address spoofing with Puzzles and CAPTCHAs?

17
Q

How do you prevent address spoofing with TTL filtering?

18
Q

How do you prevent address spoofing with traceback?

19
Q

How do you prevent address spoofing with packet filtering?

20
Q

How can you prevent DOS with buying more resources?

21
Q

What are the two types of modern DoS?

22
Q

What is a reflection attack?

23
Q

Why is DoS such a hard problem to solve?

24
Q

Why do we use DNS?

25
What is the DNS?
26
What are DNS Root Name Servers?
27
What is a DNS lookup example?
28
What is DNS chaching?
29
What are basic DNS vulnerabilities?
30
What is a DNS Packet?
31
What is the resolver to NS request?
32
What is the response to resolver?
33
What is baliwick checking?
34
What is DNS cache posoning?
- succcess aftr about 256 tries (a few minutes)
35
What are defenses to DNS cache poisoning?
36
What do you do with DNS poisoning?
37
What allows attackers to "poison" DNS?