2.10.network-attacks - Network Attacks CS 161 Computer...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Network Attacks CS 161 - Computer Security TAs: John Bethencourt, Erika Chin, Matthew Finifter, Cynthia Sturton, Joel Weinberger http://inst.eecs.berkeley.edu/~cs161/ Feb 10, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Announcements / Game Plan • Homework #1 due tomorrow (Thurs 2/11, 11:59PM) – Turn in via hardcopy to drop box in 283 Soda • Project #1 now out, due Thurs 2/18 – Turn in electronically • Goal for today: a look at network attacks – With a focus on network layers 1-4
Background image of page 2
3 Application Transport (Inter)Network Link Physical 7 4 3 2 1 Encoding bits to send them over a single physical link e.g. patterns of voltage levels / photon intensities / RF modulation Framing and transmission of a collection of bits into individual messages sent across a single “subnetwork” (one physical technology)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
4 Physical/Link-Layer Threats: Eavesdropping • For subnets using broadcast technologies (e.g., WiFi, some types of Ethernet), get it for “free” Each attached system ’s NIC (= Network Interface Card) can capture any communication on the subnet Some handy tools for doing so o Wireshark o tcpdump / windump o bro (demo) • For any technology, routers (and internal “switches”) can look at / export traffic they forward • You can also “tap” a link Insert a device to mirror physical signal Or: just steal it!
Background image of page 4
5 Stealing Photons
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 17

2.10.network-attacks - Network Attacks CS 161 Computer...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online