Lesson 9: Internet Security Flashcards

(54 cards)

1
Q

What are the four properties of secure communication?

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality in secure communication protect against?

A

Eavesdropping attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What countermeasure protects confidentiality?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity in communication ensure?

A

That the message has not changed in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What countermeasure helps ensure integrity?

A

Checksumming techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is authentication important in secure communication?

A

To verify the identity of the communication partner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does availability mean in secure communication?

A

Ensuring information is accessible on demand, even during failures or attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Round Robin DNS distribute load?

A

By cycling through DNS A records in responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a CDN choose the nearest edge server?

A

Using network topology and current link characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Fast-Flux Service Networks (FFSN)?

A

To rapidly rotate DNS A records using compromised machines as proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of flux agents in FFSNs?

A

They relay traffic between users and the control node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main data sources FIRE uses?

A
  1. Botnet C&C hosts
  2. Drive-by-download sites
  3. Phishing page hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two phases of ASwatch?

A
  1. Training Phase
  2. Operational Phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What feature families are used in ASwatch?

A
  • Rewiring Activity
  • IP Space Fragmentation
  • BGP Routing Dynamics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the operational phase of ASwatch do?

A

Assigns a reputation score to unknown ASes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three classes of breach prediction features?

A
  1. Mismanagement symptoms
  2. Malicious activities
  3. Security incident reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is exact prefix hijacking?

A

An attacker announces a route to an existing prefix owned by another AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is sub-prefix hijacking?

A

Announcing a more specific prefix to hijack traffic from a larger prefix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is squatting in BGP?

A

Announcing a prefix not currently announced by its rightful owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Type-0 hijacking?

A

Announcing a prefix not owned by the announcing AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Type-N hijacking?

A

Inserting fake links in the AS-path to falsify routing paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Type-U hijacking?

A

Changing the prefix without modifying the AS-path

23
Q

What is a blackholing (BH) attack?

A

Traffic is intercepted and dropped before reaching its destination

24
Q

What is a man-in-the-middle (MM) attack?

A

Intercepted traffic is eavesdropped or manipulated

25
What is an imposture (IM) attack?
Hijacked traffic is impersonated and responded to by the attacker
26
What are the causes of BGP attacks?
* Human error * Targeted attacks * High-impact attacks
27
What does ARTEMIS use to track owned prefixes?
A configuration file maintained by the network operator
28
What are the two ARTEMIS mitigation techniques?
1. Prefix deaggregation 1. MOAS announcements
29
What are two findings from ARTEMIS?
1. Third-party BGP announcements are effective 1. Filtering is less optimal
30
What is the structure of a DDoS attack?
Botnets flood the victim with traffic, exhausting resources
31
What is spoofing in a DDoS attack?
Setting a false IP address in the source field of packets
32
What is a reflection attack?
Spoofed requests trigger replies from reflectors to flood the victim
33
What is an amplification attack?
Large replies from reflectors further increase traffic to the victim
34
What is a traffic scrubbing service?
Filters malicious traffic before sending clean traffic to the target
35
What are ACL filters?
Rules on border routers that drop unwanted traffic
36
What is BGP Flowspec?
A BGP extension to deploy fine-grained filtering rules
37
What is BGP blackholing?
Dropping all traffic to a target prefix to stop a DDoS attack
38
What is provider-based blackholing?
Edge providers implement blackhole rules for customers
39
What is IXP blackholing?
Route servers at IXPs propagate blackhole rules to member ASes
40
What is a drawback of BGP blackholing?
Legitimate traffic to the target is also dropped
41
Which property of secure communication is primarily violated in the event that a third party pretends to be another entity on the network?
Authentication
42
Which property of secure communication is primarily violated in the event that Trudy is able to access (but not modify) the contents of a message between Alice and Bob?
Confidentiality
43
True or False: Round Robin DNS (RRDNS) is one of the 'tools' that malicious parties can use to extend the time their content is accessible/hosted on the Internet.
True
44
True or False: Fast-Flux Service Networks (FFSNs) can be leveraged by malicious actors to extend the availability of a scam.
True
45
True or False: The FIRE system takes primarily a reactive approach to infer network reputation, relying on monitoring IP blacklists.
True
46
True or False: ASwatch takes primarily a proactive approach to infer network reputation by monitoring the routing behavior of networks.
True
47
How can a rogue network remain undetected by ASwatch (stay under the radar)?
By maintaining a stable control plane behavior.
48
Which system monitors routing behavior to determine the legitimacy of a network?
ASwatch
49
Which system uses routing behavior to detect BGP hijacking attacks?
ARTEMIS
50
True or False: BGP Blackholing is a defense against prefix hijacking.
False
51
True or False: The BGP blackholing technique can only be applied for traffic related to specific applications.
False
52
When designing a system to identify DNS reflection and amplification attacks, which network operation plane(s) is essential to monitor for effective detection?
Data Plane
53
To effectively identify BGP hijacking incidents, specifically targeting BGP path and prefix manipulations, which network operation plane(s) should you primarily monitor?
Control Plane
54
Which techniques can help an attacker to attract more traffic when attempting to hijack a prefix?
* Advertise a more specific prefix than the original owner AS * Advertise a shorter path to the prefix.