Network Security Flashcards

1
Q

BGP Route hijacks

A

ASes believe other ASes routing advertisements, allowing an AS to hijack routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS Reflection

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Components

A

Confidentiality
Integrity
Availability
Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Information only provided to authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Information isnt changed in storage / transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Information accessible when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authenticity

A

Information origin is accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat

A

Potential violation of security components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack

A

Action that violates a security component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Routing Security

Control Plane Authentication

A

Session
Path
Origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Masquerade

A

Spoof DNS Server IP address

Provide name:IP mapping to attackers address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session Authentication

A

ASes send message, and message hash ( md5(message,key))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kaminsky Attack

A

DNS attack where attack sends fake DNS requests to recursive server.

When recursive server queries authoritative server for answer, attacker responds first, winning the race condition.

Attackers response has NS match in it, poisoning the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS Poison defenses

A

ID randomization
Source Port randomization
0x20 (random hostname capitalization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS Sec

A

Adds authentication to DNS protocol to allow devices to confirm identity of senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does BGPSec protect against?

A

Attacker claiming to be neighbor

AS claiming to be origin for subnet

AS claiming untrue path to subnet

Prevented with a chain of signed paths

17
Q

How is BGP hijacking made undetectable

A

Attacking AS does not decrement the TTL

18
Q

Calculate Attack Rate

A

(num IP Addresses / 2^32) * num backscatter packets = total attack rate

or

num backscatter = attack rate * (2 ^ 32 / num IP addresses)

19
Q

BGP manipulation

A

BGP does not validate information, so can be manipulated

20
Q

Origin Authentication manipulation

A

AS cant claim victim’s prefix

CAN announce path that ends at proper AS

21
Q

soBGP manipulation

A

verifies path exists

CAN advertise unavailable path

22
Q

S-BGP manipulation

A

uses path verification

CAN have shorter more expensive path announced, but forward traffic on longer cheaper route

23
Q

Data plane verification manipulation

A

Manipulator must forward traffic on path he is announcing

24
Q

Defensive filtering manipulation

A

Eliminates attacks from stubs

25
Q

3 categories of DNS attacks

A
Off path ( attackers have to guess)
On path (attackers forge replies)
In line (attackers capture legitimate requests)