hw2-solutions

hw2-solutions - the help of this information can carry out...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 566: Wireless Networks Security - Hw2 Solution Keys 1) a. See Notes (slides from the lecture: Challenges, 2/01/10) b. A DoS attack is generally orchestrated by an attacker using a single compromised node. DDoS attack is distributed. Typically, an attacker first compromises a number of nodes (called zombies) and then from these bunch of compromised nodes, sends the attack with the purpose of bringing down the service quickly. 2) See Notes (slide 8, Challenges, 2/01/10) 3) See the Handout from the class webpage: http://edition.cnn.com/2005/TECH/internet/01/20/evil.twins/index.html For guidelines on how to mitigate evil twin, see the link on the class webpage: http://www.eweek.com/article2/0,1759,1755275,00.asp 4) a. See Notes (slide 71 on 802.11 Architecture lecture on 2/01/10) b. Scan reports comprises of all the control information pertaining to all BSSs in the range (e.g., timing parameters : dtim, agreed data rates, beacon intervals). So, a malicious node with
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: the help of this information can carry out attacks such as: Timing attacks De-authentication attacks De-association attacks Power Depletion attacks (without scan reports, aggregation of such information might require huge amount of data) One could also stage the evil-twin attack. 5) a. See Notes (slides 48, 48, etc., 802.11 Architecture lecture on 2/10/10) b. See Notes c. See Notes d. See Notes. From the point of view of the sending and the receiving stations CA and CD differ as CA is carried out at the transmitting station whereas CD is carried out at the receiving end. 6) See Notes (slides 87, 88, etc., 802.11 WEP lecture on 2/01/10) Also, refer to the following link http://www.isoc.org/isoc/conferences/ndss/02/papers/stubbl.pdf 7) See Notes (Slides 74, 75 from 802.11 Architecture lecture on 2/01/10) 8) See Notes (Slide 6 of 802.11i lecture on 2/08/10) 9) See Notes (See lectures 802.11i and Radius)...
View Full Document

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Ask a homework question - tutors are online