Lesson 9: Internet Security Flashcards
(54 cards)
What are the four properties of secure communication?
- Confidentiality
- Integrity
- Authentication
- Availability
What does confidentiality in secure communication protect against?
Eavesdropping attacks
What countermeasure protects confidentiality?
Encryption
What does integrity in communication ensure?
That the message has not changed in transit
What countermeasure helps ensure integrity?
Checksumming techniques
Why is authentication important in secure communication?
To verify the identity of the communication partner
What does availability mean in secure communication?
Ensuring information is accessible on demand, even during failures or attacks
How does Round Robin DNS distribute load?
By cycling through DNS A records in responses
How does a CDN choose the nearest edge server?
Using network topology and current link characteristics
What is the purpose of Fast-Flux Service Networks (FFSN)?
To rapidly rotate DNS A records using compromised machines as proxies
What is the role of flux agents in FFSNs?
They relay traffic between users and the control node
What are the three main data sources FIRE uses?
- Botnet C&C hosts
- Drive-by-download sites
- Phishing page hosts
What are the two phases of ASwatch?
- Training Phase
- Operational Phase
What feature families are used in ASwatch?
- Rewiring Activity
- IP Space Fragmentation
- BGP Routing Dynamics
What does the operational phase of ASwatch do?
Assigns a reputation score to unknown ASes
What are the three classes of breach prediction features?
- Mismanagement symptoms
- Malicious activities
- Security incident reports
What is exact prefix hijacking?
An attacker announces a route to an existing prefix owned by another AS
What is sub-prefix hijacking?
Announcing a more specific prefix to hijack traffic from a larger prefix
What is squatting in BGP?
Announcing a prefix not currently announced by its rightful owner
What is Type-0 hijacking?
Announcing a prefix not owned by the announcing AS
What is Type-N hijacking?
Inserting fake links in the AS-path to falsify routing paths
What is Type-U hijacking?
Changing the prefix without modifying the AS-path
What is a blackholing (BH) attack?
Traffic is intercepted and dropped before reaching its destination
What is a man-in-the-middle (MM) attack?
Intercepted traffic is eavesdropped or manipulated