Question

If the attacker performs a replay attack on the TCP exchange, replaying the messages without any...

If the attacker performs a replay attack on the TCP exchange, replaying the messages without any modification, then will the server (node3) know that an attack may have occurred? Explain why or why not.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

networks and computers subject to replay attack would see the attack process as legitimate messages. One example of a replay attack is to replay the message sent to a network by an attacker, which was earlier sent by an authorized user. Although the messages might be encrypted and the attacker may not get the actual keys, retransmission of valid data or login messages could help them gain sufficient access to the network. A replay attack can gain access to the resources by replaying an authentication message and can confuse the destination host.

One of the best techniques to avert replay attacks is by using strong digital signatures with timestamps. Another technique that could be used to avoid a replay attack is by creating random session keys which are time bound and process bound. A one-time password for each request also helps in preventing replay attacks and is frequently used in banking operations. Other techniques used against replay attacks include the sequencing of messages and non-acceptance of duplicated messages.

Consider this real-world example of an attack. A staff member at a company asks for a financial transfer by sending an encrypted message to the company's financial administrator. An attacker eavesdrops on this message, captures it, and is now in a position to resend it. Because it's an authentic message that has simply been resent, the message is already correctly encrypted and looks legitimate to the financial administrator.

In this scenario, the financial administrator is likely to respond to this new request unless he or she has a good reason to be suspicious. That response could include sending a large sum of money to the attacker's bank account.

I think the network will not know.

Add a comment
Know the answer?
Add Answer to:
If the attacker performs a replay attack on the TCP exchange, replaying the messages without any...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For the following questions I would like you to discuss the particulars of each attack scenario...

    For the following questions I would like you to discuss the particulars of each attack scenario and how Kerberos defends against it. You will need to consider various elements of the attack scenarios. Some attacks can be implemented between multiple Kerberos components. For example, a MITM attack could occur between various components at various times. State your assumptions about how the attack is occurring, then describe how Kerberos defends against it. Good answers will describe both the particulars of the...

  • I'm busy experimenting with TCP socket connnections. I have made a client SOCK_STREAM socket andi've got...

    I'm busy experimenting with TCP socket connnections. I have made a client SOCK_STREAM socket andi've got a few questions: + Is there any way that a streaming(TCP) socket can get data from another socket without having to connect to it? + Is it safer to have a socket that a client connects to send data, and another one that the client gets data from (the server sockets exchange data) instead of one up and down socket? Because what i'm trying...

  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Communication and Diversity in Healthcare Communication is the exchange of _______________, _____________, _____________, and ____________. List...

    Communication and Diversity in Healthcare Communication is the exchange of _______________, _____________, _____________, and ____________. List four (4) factors that must be met to avoid interfering with the communication process. What is wrong with the following communications processes as they relate to patients? “I think your problem is cholelithiasis.” Speaking in a very soft, muted tone. Radio playing loudly while preoperative care is discussed “I don’t got any appointments at that time.” “I don’t know. Who cares?” Interrupting before the...

  • Please help!! Cultural messages, simply, are what everyone in a group knows that outsiders do not...

    Please help!! Cultural messages, simply, are what everyone in a group knows that outsiders do not know. They are a series of lenses that shape our perceptions, interpretations, boundaries, and values. Users: Anyone involved in a cross-cultural conflict. This includes not only people from different countries, but also people from different gender, age, ethnic, religious, regional, even different professional groups. (One might speak of the engineering culture or the business culture, for example.) Description: Culture is an essential part of...

  • Cuban culture and american culture Cultural messages, simply, are what everyone in a group knows that...

    Cuban culture and american culture Cultural messages, simply, are what everyone in a group knows that outsiders do not know. They are a series of lenses that shape our perceptions, interpretations, boundaries, and values. Users: Anyone involved in a cross-cultural conflict. This includes not only people from different countries, but also people from different gender, age, ethnic, religious, regional, even different professional groups. (One might speak of the engineering culture or the business culture, for example.) Description: Culture is an...

  • Cuban and american culture, please and thank you! Cultural messages, simply, are what everyone in a...

    Cuban and american culture, please and thank you! Cultural messages, simply, are what everyone in a group knows that outsiders do not know. They are a series of lenses that shape our perceptions, interpretations, boundaries, and values. Users: Anyone involved in a cross-cultural conflict. This includes not only people from different countries, but also people from different gender, age, ethnic, religious, regional, even different professional groups. (One might speak of the engineering culture or the business culture, for example.) Description:...

  • Beauda Medical Center Lance Popperson woke up in a sweat, with an anxiety attack coming on....

    Beauda Medical Center Lance Popperson woke up in a sweat, with an anxiety attack coming on. Popperson popped two anti- anxiety pills, lay down to try to sleep for the third time that night, and thought once again about his dilemma. Popperson is an associate with the accounting firm of Hodgins and Gelman LLP. He recently discovered, through a casual conversation with Brad Snow, a friend of his on the audit staff, that one of the firm's clients managed by...

  • If anyone knows the answrrs to any of these questions on the paper( preferably all) I...

    If anyone knows the answrrs to any of these questions on the paper( preferably all) I would appreciate it. Quarrative Reasoning in C ivis, Lot 2008 3) Some studies have shown that the person who gives the placebo to the pain can influence its effect. For instance, the doctor or nurse says that it is a very powerful medication that will help them, the placebo effect can be stronger Part A placebo Should the person who gives a placebo to...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT