exam 3 Flashcards

(47 cards)

1
Q

what is slow start

A
  • a technique to discover the network capacity
  • start with cong win = 1
  • double each RTT (grow exponentially)
  • keeps growing until it hits a threshold or packet loss
  • then AIMD starts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is DECbit

A
  • early congestion control
  • routers set DECbit in packet header if its experiencing congestion
  • sender looks at DECbit on ACKS and adjusts the window size acordingly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Random Early Detection (RED)

A
  • used to detect and signal congestion before it happens
  • drops packets based on threshold sizes of queue

q < min: no packets dropped
q >max: all incoming packets drops
min < q < max: packets randomly drop with prob linear to q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Source-Based Congestion
Avoidance

A

source watches for signs that routers queue is building up

can watch for:
- RTT changes
- throughut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is “fair” in fair queueing

A
  • each flow gets reasonable access to resources
  • no starvation
  • equal access under equal condition
  • proportional resource alocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the min-max alg

A
  • to maximize the minimum alocation we can provide to each flow

1) divide recourse evenly to all flows
2) if a flow has excess they return the excess
3) excess is split between the rest of the flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how does weighted min-max differ

A
  • each flow has a weight
  • instead of equal split, it is porportional to the weights.

let c = capacity
1) add up all weights = n
2) for flow i with weight w: allocate (w/n) * c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FIFO

A
  • first in first out
  • uses tail drop to drop packet if queue is full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

priority queue

A
  • multiple queues for different priorities
  • serve highest priority first
  • can cause starvation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

fair queueing

A
  • separate queue for each flow
  • each queue gets a turn by round robin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fair queueing with variable packet length

A
  • way to choose which packet to consume

let Si = 0 for flow i

when a packet is consumed from flow i, Si += P (P = packet length)

choose packet such that (Si + P) is min

break ties with lowest flow ID

weighted version: Si += P/wi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

confidentiality

A

control access to info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

integrity

A

keeping info valid, data wasnt changed or altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

availability

A

keep info available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authenticity

A

data came from trusted/correct source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

accountability

A

actions by a user can be traced back to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

non-repudiation

A

once something is done, you cant deny it was done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

passive attacks

A
  • does not disrupt operations
  • used to listen and gain info
  • hard to detect, easy to prevent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

active attack

A
  • very broad, can disrupt operations
  • hard to prevent, easy to detect
20
Q

message release attack

A
  • passive
  • read contents of messages directly
  • prevent using encryption
21
Q

traffic analysis

A
  • learn info like credentials, location… without directly seeing the messages
22
Q

masqurade attacks

A
  • active
  • pretending to be someone else to gain unauthorized access to systems.
23
Q

replay attack

A
  • active
  • capture message, then replay it unchanged to the receiver
  • used to gain information
24
Q

modification of message attack

A
  • active
  • intercepts and alters message between 2 parties
25
denial of service attack
- active - goal of disrupting operations of system. - can be done by overloading the server
26
symmetric vs asymmetric encryption
symmetric: - both users use the same key asymmetric: - use private and public keys
27
what does the strength of the security rely on
- the length of the key - encryption alg complexity the encryption alg is known by everyne
28
how to ensure message was not tampered or corupted
mac: - F (k, msg) - a function creates a value from a key, and the message - the value is sent along with the message - the receiver computes a value and compares it to the sent value one way hash: - no key - message is hashed and encrypted with a shared secret - receiver de-crypts it and computes its own hash and compares
29
predeistribution of public keys
- user gives the world their public key along with their id - attacker will want to give their public key along with someone elses id - we use CA to verify the authenticity of the key
30
CA
- acts as a chain of vouching - starts at a core trusted org and branches down
31
how does challenge response work
- to authenticate a user without sharing the secret 1) client sends auth request to server 2) server sends challenge to user (timestamp) 3) client computes answer to challenge (signs timestamp with private key) 4) server verfies solution (using clients public key)
32
what is challenge-response vulnerable to
MITM attacker gets the answer from client and sends to server. so it authenticates itselfw
33
what is challenge-response immune to
replay attacks since it uses a unique challenge each time the attacker cant simply resend the same thing
34
public key authorization with clock sync
- alice sends timestamp to bob - bob checks if request is fresh - bob replys with a session key that they then use for coms
35
public key authorization with no clock sync
- alice sends timestamp to bob, bob sends his time and alices back to alice - alice decides if its fresh - alice sends bob sesh key
36
symmetric key
- all users give the master key to the KDC - KDC generates a session key - users use the session key for coms
37
needham-shroeder
- based on symetric key - only one user contacts the KDC - KDC returns a sesh key and a ticket - user gives ticket to other user who decrypts it to get the key
38
how does needham-shroeder prevent replay attacks
- it uses nonce (random num) to ensure uniqueness of session
39
kuberos
- based on needham-shroeder - for client server coms - auth by password - master key is derived from pass 1) client sends auth req to KDC with name and pass as the master key 2) KDC auth system returns a ticket 3) client sends the ticket to KDC ticket granter 4) ticket granter returns a token to the client 5) client shares token with server
40
goal of Diffie-Hellman Key Agreement
- to agree on a shared key without accually sharing a key
41
how does Diffie-Hellman Key Agreement work
- users agree on large prime num P and base prime root g - each user generates a private key (a) - each user generates public key (k) by doing g^a mod P - users exchange public keys - users do: k^a mod P - due to modular exponentiation, they both end up with the same key
42
what is Diffie-Hellman Key Agreement vulnerable to what, why, fix
MITM it doesnt provide authentication so someone could intercept and create their own keys and relay the messages fix it with predistributed public keys
43
Pretty Good Privacy (for what, how)
- for email and files - user has public and private key - user generates session key - user encrypts message with session key and encrypts session key with receivers public key - send msg and session key to receiver - reciever decrypts them with their public key - dups possible
44
how is IPsec modular
allows users to select from a variety of cryptographic algorithms
45
applications of IPsec
- secure branch office over internet - secure remote access over internet
46
IPsec transport mode
- only payload is encrypted - used for end-to-end coms
47