Shared Flashcard Set

Details

Privacy
N/A
29
Computer Science
Undergraduate 4
05/09/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What is the IP Address for?
Definition
Same as registration plates
Term
What is safe to keep in raw data?
Definition
None
Term
What should you not do with packets?
Definition
Store or monitor the content
Term
Why would you want to store data?
Definition
Application-level analysis
ID tunnel-ed traffic
Intrusion detection
Share with research community
Term
Why headers too?
Definition
DHCP in organisations is relatively static
For very short packets, the CRC can reduce the guesswork to reconstruct the packet
Term
What three ways to anonymise?
Definition
Scrap
Scramble
Count
Term
What's 'scrap'?
Definition
Get rid of it (example 0.0.0.0)
Term
What is scramble?
Definition
Encrypt it
Term
What is 'count'?
Definition
Increase the IP address:

Ex. 10.0.0.1, 10.0.0.2, 10.0.0.3
Term
How to reconstruct?
Definition
Network and compare anonymised trace with generated traffic

Identify servers. E.g proxy / web
Term
Whom should see the information?
Definition
Depends on the contract with the user
Term
What's the problem with default windows vista installation?
Definition
It allows file sharing for the 'local network'
Term
What's the problem with default windows xp installation?
Definition
Supports TCP options and doesn't respond to ICMP
Term
Switch versus hub?
Definition
traffic monitoring can be done only in the aggregation poins, no choice of monitoring local subnets
Term
Virtual LANs are used for what?
Definition
Used to segregate hosts connecting to the same switch
Term
Firewalls are what for intrusive monitoring?
Definition
The beginning of the end
Term
Why do we want a firewall?
Definition
Network security cannot be ignored
Term
What principles does NAT destroy?
Definition
IP address uniqueness
Remote endpoints cannot connect directly
Term
Why does NAT cause problems with monitoring?
Definition
Accounting traffic per IP address does not indicate individual performance
Term
How can the number NAT thing be inferred?
Definition
TTL / System fingerprinting
IP ID field
Term
Why are proxies bad for network monitoring?
Definition
Any direct link between endpoints is severed
Term
What is tunnelling?
Definition
Describes an application embedding its traffic into another application
Term
How is tunnelling detectable?
Definition
Application-level analysis
Term
What's VPN to network monitoring?
Definition
'THE END!'
Term
What two ways are there to identifying apps
Definition
Signature and anomaly based
Term
Why is port-based application identification not an option?
Definition
Misuse of port 80
Term
Why is privacy / anonomization bad for researchers?
Definition
Increasingly difficult to gather information about network performance outside the controlled environment
Term
Why are network managers ok with the privacy?
Definition
Good balance between network security and its performance
Term
Why is it quite good fo companies providing monitoring solutions?
Definition
Means that people need ready-made solutions and expertise required to ID optimal solutions
Supporting users have an ad free experience!