Question

Network security 1. explain succinctly how a Denial of Service attack may occur on an implementation...

Network security

1. explain succinctly how a Denial of Service attack may occur on an implementation of the TCP protocol's 3 way handshake?

2. Suggest solutions on your own on how such a Denial of Service attack on TCP 3-way handshake can potentially be prevented or mitigated? Note that you are being asked to think through this answer on your own. You are however allowed to research on the Internet for potential solutions. Please make sure you understand the solution and write your response in your own words.

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  1. Denial of Service (DoS) is any kind of attack that aims to prevent users from using the computer resources or services. It is usually accomplished by sending huge amount of requests to the target system. Hence it will become difficult for the victim node to provide service to its users. SYN flood is a denial of service attack which exploits the three-way handshake in a TCP connection. It is also called as half-open attack. DoS is achieved by making a server unable to service its clients by consuming its available resources. In a TCP connection, there exists three processes to establish a connection. Firstly, the client will send a SYN message to the server. As an acknowledgement the server sends a SYN/ACK message. Lastly, the client will have to send an ACK message to indicate the receipt of the packet from server. Thus a server will wait for the final ACK message from the client in three-way handshake. An attacker utilizes this loophole. He /She will bombard the server with a high volume of SYN messages. It may be done with spoofed IP addresses. So the server will respond to every request and waits for the ACK message, which will never hit the server. A port is left open for receiving ACK message from client. Meanwhile the attacker sends more connection requests. This requests make the server to keep a port open for some specific time. Thus in effect all the available ports will be occupied and server cannot service its genuine users. Here the server is half-open as it leaves the connection open. Hence it is a half open attack.

  1. Denial of Service attack on TCP 3- way handshake can be mitigated using the following techniques:
  • There will be a limit set for the number of half open ports. Some backlog memory is always maintained to service the new requests. Thus increasing the Backlog will prevent the DoS.
  • Network administrators can either lower the timeout period or carefully drops the connection requests.
  • The oldest open port can be reused when the backlog is about to filled up with SYN messages.
  • Server can maintain a cookie to register the newly coming connections when the backlog is completely filled. Server will send the SYN/ACK and removes the SYN packet from backlog for making the port ready for new connection. If any legitimate request appears with ACK message, then the SYN message is recreated from cookie data and serviced.
Add a comment
Know the answer?
Add Answer to:
Network security 1. explain succinctly how a Denial of Service attack may occur on an implementation...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • explain 1 or 2 molecular details in how epigenetics may allow melanoma cells to outsmart BRAF inhibitors **This is for a genetics course Seope: This science commentary claims that epigeneties pl...

    explain 1 or 2 molecular details in how epigenetics may allow melanoma cells to outsmart BRAF inhibitors **This is for a genetics course Seope: This science commentary claims that epigeneties plays a role in cancer cells becoming therapy-resistant. The language used is generalized for the non-scientist and does not include any molecular details, such as methylation of a specific nucleotide in an allele or modification of a specific histone tail amino acid. Your task (individually or in a group of...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • 1. find an article about a product or service that impacts your daily life and write...

    1. find an article about a product or service that impacts your daily life and write 1 to 2 paragraphs describing the item, how it impacts your life, and what factors you think are impacting the supply and demand of this item. Be sure to include the URL of the article you accessed for this question. 2.What are the ethics of outsourcing? Is a corporation’s primary responsibility to its stockholders, by reducing labor costs? Or is its primary responsibility to...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT