Module 9: AI Flashcards

(23 cards)

1
Q

What are the properties of secure communication?

A

Confidentiality, integrity, authentication, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Round Robin DNS (RRDNS) work?

A

It cycles through multiple IP addresses for a domain to distribute incoming requests across servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DNS-based content delivery work?

A

DNS returns server IPs based on client location, load, or performance to route users to optimal replicas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do Fast-Flux Service Networks work?

A

They rapidly rotate large pools of compromised hosts as front-end proxies to hide malicious servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main data sources used by FIRE to identify rogue networks?

A
  • Botnet C2 providers
  • Drive-by-download
  • Phish housing providers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the 2 phases of ASwatch.

A

Training: Collect longitudinal BGP behavior
Operational: Analyze features (e.g., volatility, relationships) to classify suspicious ASes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 classes of features used to determine likelihood of a security breach?

A
  • Spam
  • Phishing and Malware
  • Scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(BGP hijacking) What is the classification by affected prefix?

A

Exact-prefix hijack, sub-prefix hijack, and squatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(BGP hijacking) What is the classification by AS-Path announcement?

A
  • Type-O – AS does not own prefix
  • Type-N – fake link between ASes
  • Type-U – modify prefix but not AS-PATH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(BGP hijacking) What is the classification by data plane traffic manipulation?

A
  • Dropped → blackholing attack
  • Eavesdropped → man-in-the-middle attack
  • Impersonation → impostor attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the causes or motivations behind BGP attacks?

A
  • Human Error
  • Targeted Attack
  • High Impact Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the scenario of prefix hijacking.

A

An attacker announces ownership of IP prefixes they do not control, redirecting traffic towards themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the scenario of hijacking a path.

A

An attacker alters AS-path information to redirect or observe traffic without claiming the prefix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key ideas behind ARTEMIS?

A

Use the following to trigger alerts and detect anomalies:
- Configuration file
- Mechanism for receiving BGP updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two automated techniques used by ARTEMIS?

A
  • Prefix deaggregation
  • Mitigation with Multiple Origin AS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two findings from ARTEMIS?

A
  • Outsource task of BGP announcements
  • Outsourcing outperformed prefix filtering
17
Q

Explain the structure of a DDoS attack.

A

Many compromised devices flood a target with traffic, overwhelming resources and causing service denial.

18
Q

What is spoofing, and how is it related to a DDoS attack?

A

Using forged source IPs; it hides attackers and enables reflection/amplification attacks.

19
Q

Describe a Reflection and Amplification attack.

A

Attackers send spoofed requests to servers that reply with large responses to a victim, amplifying traffic volume.

20
Q

What are the defenses against DDoS attacks?

A

Rate limiting, filtering, scrubbing centers, blackholing, and ingress/egress filtering.

21
Q

Explain provider-based blackholing.

A

An ISP drops all traffic to a victim’s IP after receiving a special BGP community tag.

22
Q

Explain IXP blackholing.

A

An Internet Exchange Point accepts blackhole routes and drops traffic before it reaches member networks.

23
Q

What is one of the major drawbacks of BGP blackholing?

A

It sacrifices availability by discarding all traffic—including legitimate traffic—to the targeted prefix.