What is a denial-of-service attack? What are the two types?
How is the first step of DOS done?
How is the second step of DOS done?
How is the third step of DOS done?
How is the fourth step of DOS accomplished?
How is the fifth step of DOS accomplished?
How prevelant are DOS attacks?
How did UCSD find a good estimate for how prevelant are DOS attacks?
How did UCSD’s way of finding how many DOS attacks work?
How does random IP spoofing produce random backscatter?
How do you analyze backscatter?
What is victim characterization by DNS name/
Who is a target to DOS?
What to do against DOS attacks?
How do you prevent address spoofing with filtering and SYN cookies?
How do you prevent address spoofing with Puzzles and CAPTCHAs?
How do you prevent address spoofing with TTL filtering?
How do you prevent address spoofing with traceback?
How do you prevent address spoofing with packet filtering?
How can you prevent DOS with buying more resources?
What are the two types of modern DoS?
What is a reflection attack?
Why is DoS such a hard problem to solve?
Why do we use DNS?
What is the DNS?
What are DNS Root Name Servers?
What is a DNS lookup example?
What is DNS chaching?
What are basic DNS vulnerabilities?
What is a DNS Packet?
What is the resolver to NS request?
What is the response to resolver?
What is baliwick checking?
What is DNS cache posoning?
- succcess aftr about 256 tries (a few minutes)
What are defenses to DNS cache poisoning?
What do you do with DNS poisoning?
What allows attackers to “poison” DNS?