Recent Changes - Search:

Instructor

  • who: Michael Swift
  • where: Room 7369
  • when: Monday 11-12, Thursday 1:30-2:30
  • email: swift 'at' cs.wisc.edu
  • TAs

Lecture:

HomePage

Resources

edit SideBar

NetworkReview

Ethernet MAC spoofing

  1. Most organizations put a MAC filter on network ports, meaning that they will only allow traffic from a single MAC address to arrive over that cable plugged into that port.
    1. What security does this provide? What does it make harder?
    2. Suppose you are an attacker and find an ethernet port in an empty conference room. Can you do anything to connect your computer through this port?
  2. ARP poisoning: What is ARP poisoning, and how does it compromise a network?
  3. DoS: List three kinds of DoS attack, in increasing power (number of packets sent to the victim) and difficult of stopping.
  4. What is reflection, and what properties are needed for it to amplify an attack?

Firewall / IDS

  1. What are the layers of the network where a firewall/IDS can be deployed?
  2. At each levels, describe an attack where a stateless firewall at that level cannot detect the attack
  3. What is the difference between an IDS and an IPS system? What are the different performance requirements?
  4. Explain how you would use a firewall/IPS to stop buffer overflow attacks on HTTP processing in a web server.
  5. Explain an algorithmic attack on a firewall that uses a binary tree to store flow information: source and destination IP addresses, protocol (e.g., UDP or TCP) and port numbers.
  6. What is the outcome of an algorithmic attack on a firewall? What is the outcome on an IDS?
  7. Which is better able to detect attacks: an IDS on sitting in the network between the internet and your computer, or one running on your computer, and why? What kinds of attacks are better detected in each location?

Surveillance

  1. For each approaches to censorship, explain what you must do to evade the censor
    1. DNS filtering
    2. IP address filtering
    3. URL filtering
    4. Protocol filtering
    5. Deep packet inspection
  2. What surveillance approaches can TOR protect against that a single-hop network proxy cannot protect against?
Edit - History - Print - Recent Changes - Search
Page last modified on May 09, 2019, at 01:57 PM