Network Security: DoS Flashcards

1
Q

What is a DoS attack?

A

Definition according to NIST:
The prevention of authorized access to resources or the delaying of time-critical operations

DoS attacks seeks to compromise the availability of a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can DoS attacks be carried out on the physical layer? (OSI layer 1)

A

Network wires and such can be destroyed or tampered with physically.

In the lecture, an example was used where construction work on a highway caused internet and phone disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most common form of DoS attacks against wireless networks?

A

Drowning out the legitimate signals with noise. This is also called jamming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the hidden terminal problem?

A

A problem where nodes can communicate with a wireless access point, but not directly with other nodes that might also use this access point.

Node A and C and see node B, but not each other.

This can result in interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SIFS and DIFS?

(Short Interframe Spaces and
Distributed Coordination Function Interframe Spaces)

A

Safeguards against collisions. Often used in 802.11. Adds gaps in-between packets.

SIFS is used for existing exchanges and DIFS is required for new exchanges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RTS/CTS?

A

Request to Send / Clear to Send.
Reservation mechanism where you ask for allowance before communicating over wireless networks. The receiving node will defer all other transmissions for the requested time. Helps prevent collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can RTS/CTS be abused by attackers?

A

An attacker can modify the duration field of the RTS packets to reserve the channel for additional time.
The maximum time is 32,767 ms, meaning that a rogue station can block all other stations by sending malicious RTS 30 times per second.

The attack can be carried out with minimal equipment. A Raspberry Pi is sufficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a deauthentication attack?

A

An attack that uses a feature of the 802.11 standard to achieve DoS.

802.11 allows base stations to disassociate rogue stations by sending a disassociation frame. They are not authenticated and cannot be refused.

To carry the attack out, the attacker needs to know the MAC address of the victim. MAC address can be found by sniffing wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly