RelativeResourceManager34

RelativeResourceManager34 - CprE 530 Lecture 11 Topics...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
CprE 530 Lecture 11 Topics Packet Flow Scenarios BOOTP DHCP
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Putting it all together Route tables
Background image of page 2
Scenario 1 (H1 to H2) Scenario 1 (H1 to H2)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Scenario 2 (H1 to H3) Scenario 2 (H1 to H3)
Background image of page 4
Scenario 3 (H1 to H4) Scenario 3 (H1 to H4)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Scenario 4 (H1 to H5) Scenario 4 (H1 to H5)
Background image of page 6
Scenario 5 (H1 to no host on net 1) Scenario 5 (H1 to no host on net 1)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Scenario 6 (H1 to no host on net 2) Scenario 6 (H1 to no host on net 2)
Background image of page 8
Header Based There have been some IP header attacks. Most famous is the ping of death • Most have been fixed Fewer ARP and ICMP header attacks Protocol Based Even though the IP protocol is simple, the routing is complex. There are a large number of protocol based • There are a large number of protocol based attacks involving sending packets the confuse the receiver or interjects packets into the receiver. They work because there is no authentication of the sender and receiver.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protocol Based ICMP: – Using redirect ARP – ARP cache poisoning (better classified as an authentication attack Authentication Based This is a big problem, since we often use the IP address as authentication. IP – Address spoofing is very difficult to implement unless you can “see” the traffic – IP address spoofing is very hard to stop if the attacker is in the right place. ARP DHCP
Background image of page 10
Computer A Computer B 2) Reply Packet from A: Destination = B Source = A 3) Reply packet from B: Destination = A Source = B IP Spoofing The Internet Attacker 1) First packet: Destination = A Source = B (spoofed) Figure 6.20 IP Address Spoofing IP Spoofing Mitigation Check source IP address before allowing packet into the Internet
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 20

RelativeResourceManager34 - CprE 530 Lecture 11 Topics...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online