hw5 - Question 5 What is the difference between statistical...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
12/01/2009 CSE 565: Computer Security Due: No need to hand in Homework 5 Question 1: Problem 16.3 from Stallings. Question 2: What is clogging attack in the context of key management in IPSec? Describe brieFy what is cookie exchange in Oakley key management protocol and how it can control clogging attack? Question 3: Describe the security features of Trusted Solaris in no more than one page. Include the references you used. Question 4: Describe the security features of SELinux in no more than one page. Include the references you used.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Question 5: What is the difference between statistical anomaly detection and rule-based intrusion detection? Restrict your answer to no more than two paragraphs. (Do some literature search on intrusion detection, if necessary.) Question 6: Problem 18.1 from Stallings. Hint: Use Bayes Rule. Question 7: What is salt in the context of Unix password management? (Material from Ch. 18 of Stallings). Solution sketch will be posted during the weekend. 1...
View Full Document

This document was uploaded on 09/17/2010.

Ask a homework question - tutors are online