Lec 15: Network Security II: Denial of Service (DoS) and DNS Flashcards

1
Q

What is a denial-of-service attack? What are the two types?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the first step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the second step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is the third step of DOS done?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is the fourth step of DOS accomplished?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the fifth step of DOS accomplished?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How prevelant are DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How did UCSD find a good estimate for how prevelant are DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How did UCSD’s way of finding how many DOS attacks work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does random IP spoofing produce random backscatter?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you analyze backscatter?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is victim characterization by DNS name/

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is a target to DOS?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What to do against DOS attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you prevent address spoofing with filtering and SYN cookies?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you prevent address spoofing with Puzzles and CAPTCHAs?

A
17
Q

How do you prevent address spoofing with TTL filtering?

A
18
Q

How do you prevent address spoofing with traceback?

A
19
Q

How do you prevent address spoofing with packet filtering?

A
20
Q

How can you prevent DOS with buying more resources?

A
21
Q

What are the two types of modern DoS?

A
22
Q

What is a reflection attack?

A
23
Q

Why is DoS such a hard problem to solve?

A
24
Q

Why do we use DNS?

A
25
Q

What is the DNS?

A
26
Q

What are DNS Root Name Servers?

A
27
Q

What is a DNS lookup example?

A
28
Q

What is DNS chaching?

A
29
Q

What are basic DNS vulnerabilities?

A
30
Q

What is a DNS Packet?

A
31
Q

What is the resolver to NS request?

A
32
Q

What is the response to resolver?

A
33
Q

What is baliwick checking?

A
34
Q

What is DNS cache posoning?

A
  • succcess aftr about 256 tries (a few minutes)
35
Q

What are defenses to DNS cache poisoning?

A
36
Q

What do you do with DNS poisoning?

A
37
Q

What allows attackers to “poison” DNS?

A