Network Incident-Based classification of Attacks: Consider the Incident-Based cl
ID: 3568353 • Letter: N
Question
Network Incident-Based classification of Attacks:
Consider the Incident-Based classification of lecture 9 (p 9.41). We would like to extend this classification with another dimension, and that is the layer in which the incident has occurred. In particular, consider the following attacks.
(a) Physical tapping (L1)
(b) Spanning Tree Protocol attack (L2)
(c) BGP attack (L3)
(d) SYN attack (L4)
(e) Flash crowd DoS attack (L5)
fill out the following table with appropriate wording:
Physical Attack
STP Attack
BGP Attack
SYN Attack
Flash Crowd Attack
Attacker
Tool
Vulnerability
Action
Target
Unauthorized Result
Objectives
Physical Attack
STP Attack
BGP Attack
SYN Attack
Flash Crowd Attack
Attacker
Tool
Vulnerability
Action
Target
Unauthorized Result
Objectives
Explanation / Answer
Physical Tapping
STP Attack
BGP Attack
SYN Attack
Flash Crowd Attack
Attacker
Hackers,
Terrorists
LAN Hackers
Hackers
Hackers
Hackers
Tool
Physical Attack,
Data Tap,
User Commands
Physical Attack(Disrupting switches)
Scripts or programs
Script or program
Pre-built program
Vulnerability
Design,
Configuration
Configuration
Design,
Implementation,
Configuration
Implementation
Action
Probe,
Steal,
Modify,
Delete
Modify,
Probe,
Delete,
copy
Steal data,
Probe, black holing and loss of connectivity
Spoof
Create traffic to server
Target
Data,
Network
Network
Routers
Server
Web site
Unauthorized result
Disclosure of information,
Corrupting information,
Theft of resources
Disclosure of information,
Theft of resources
Disclosure of protected information, Disturbance in routing functionality
Denial of service
Increased load on the server, packet loss and congestion
Objectives
Damage,
Challenge
Damage, Challenge
Changing the functionality of routing tables
Crashing the server
Forcing the web site to serve the requests.
Physical Tapping
STP Attack
BGP Attack
SYN Attack
Flash Crowd Attack
Attacker
Hackers,
Terrorists
LAN Hackers
Hackers
Hackers
Hackers
Tool
Physical Attack,
Data Tap,
User Commands
Physical Attack(Disrupting switches)
Scripts or programs
Script or program
Pre-built program
Vulnerability
Design,
Configuration
Configuration
Design,
Implementation,
Configuration
Implementation
Action
Probe,
Steal,
Modify,
Delete
Modify,
Probe,
Delete,
copy
Steal data,
Probe, black holing and loss of connectivity
Spoof
Create traffic to server
Target
Data,
Network
Network
Routers
Server
Web site
Unauthorized result
Disclosure of information,
Corrupting information,
Theft of resources
Disclosure of information,
Theft of resources
Disclosure of protected information, Disturbance in routing functionality
Denial of service
Increased load on the server, packet loss and congestion
Objectives
Damage,
Challenge
Damage, Challenge
Changing the functionality of routing tables
Crashing the server
Forcing the web site to serve the requests.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.