WITH ANSWERS
|\ |\
DOS attack classification- Hitlist Scanning - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔A portion of a list of targets is supplied to
|\ |\ |\ |\ |\ |\ |\ |\ |\
a compromised computer
|\ |\
DOS attack classification - Permutation Scanning - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔All compromised computers share a
|\ |\ |\ |\ |\
common pseudo-random permutation of the
|\ |\ |\ |\
IP address space.
|\ |\
DOS attack classification - Signpost Scanning - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Uses the communication patterns of the
|\ |\ |\ |\ |\ |\
compromised computer to find new target. |\ |\ |\ |\ |\
DOS attack classification- Random Scanning - CORRECT
|\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Each compromised computer probes
|\ |\ |\ |\
random addresses |\
, DOS attack classification - Random Spoofing - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Generate 32-bit numbers and stamp
|\ |\ |\ |\ |\
packets with them. |\ |\
DOS attack classification - Subnet Spoofing - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Generate random addresses within |\ |\ |\
a given address space.
|\ |\ |\
DOS attack classification - Fixed Spoofing - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔The spoofed address is the address
|\ |\ |\ |\ |\
of the target.
|\ |\
DOS attack classification - Infrastructure attack - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔The motivation of this attack is a
|\ |\ |\ |\ |\ |\ |\
crucial service of a global internet
|\ |\ |\ |\ |\
operation, for example core router
|\ |\ |\ |\
DOS attack classification - Server Application - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔The attack is targeted to a specific
|\ |\ |\ |\ |\ |\ |\
application on a server |\ |\ |\