Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Incident-Based classification of Attacks: Consider the Incident-Based cl

ID: 3568353 • Letter: N

Question

Network Incident-Based classification of Attacks:

Consider the Incident-Based classification of lecture 9 (p 9.41). We would like to extend this classification with another dimension, and that is the layer in which the incident has occurred. In particular, consider the following attacks.

(a) Physical tapping (L1)

(b) Spanning Tree Protocol attack (L2)

(c) BGP attack (L3)

(d) SYN attack (L4)

(e) Flash crowd DoS attack (L5)

fill out the following table with appropriate wording:

Physical Attack

STP Attack

BGP Attack

SYN Attack

Flash Crowd Attack

Attacker

Tool

Vulnerability

Action

Target

Unauthorized Result

Objectives

Physical Attack

STP Attack

BGP Attack

SYN Attack

Flash Crowd Attack

Attacker

Tool

Vulnerability

Action

Target

Unauthorized Result

Objectives

Explanation / Answer

Physical Tapping

STP Attack

BGP Attack

SYN Attack

Flash Crowd Attack

Attacker

Hackers,

Terrorists

LAN Hackers

Hackers

Hackers

Hackers

Tool

Physical Attack,

Data Tap,

User Commands

Physical Attack(Disrupting switches)

Scripts or programs

Script or program

Pre-built program

Vulnerability

Design,

Configuration

Configuration

Design,

Implementation,

Configuration

Implementation

Action

Probe,

Steal,

Modify,

Delete

Modify,

Probe,

Delete,

copy

Steal data,

Probe, black holing and loss of connectivity

Spoof

Create traffic to server

Target

Data,

Network

Network

Routers

Server

Web site

Unauthorized result

Disclosure of information,

Corrupting information,

Theft of resources

Disclosure of information,

Theft of resources

Disclosure of protected information, Disturbance in routing functionality

Denial of service

Increased load on the server, packet loss and congestion

Objectives

Damage,

Challenge

Damage, Challenge

Changing the functionality of routing tables

Crashing the server

Forcing the web site to serve the requests.

Physical Tapping

STP Attack

BGP Attack

SYN Attack

Flash Crowd Attack

Attacker

Hackers,

Terrorists

LAN Hackers

Hackers

Hackers

Hackers

Tool

Physical Attack,

Data Tap,

User Commands

Physical Attack(Disrupting switches)

Scripts or programs

Script or program

Pre-built program

Vulnerability

Design,

Configuration

Configuration

Design,

Implementation,

Configuration

Implementation

Action

Probe,

Steal,

Modify,

Delete

Modify,

Probe,

Delete,

copy

Steal data,

Probe, black holing and loss of connectivity

Spoof

Create traffic to server

Target

Data,

Network

Network

Routers

Server

Web site

Unauthorized result

Disclosure of information,

Corrupting information,

Theft of resources

Disclosure of information,

Theft of resources

Disclosure of protected information, Disturbance in routing functionality

Denial of service

Increased load on the server, packet loss and congestion

Objectives

Damage,

Challenge

Damage, Challenge

Changing the functionality of routing tables

Crashing the server

Forcing the web site to serve the requests.