The personal wiki of ...
Relevant Readings

Short Essay Questions

Maximum of one page. Presentation (spelling, grammar and other aspects of writing) as well as correctness are considered when marking.

1. Write up descriptions of four examples of different denial-of-service attacks based upon amplification techniques at the network and application layer. For each example, explain the vulnerability being exploited, the type of amplification that results and possible mitigations for the attack. Make sure you include at least one example of both impact and traffic amplification.

2. Consider misuse (also known as signature-detection) and anomaly-detection network intrusion detection systems. In particular, discuss how these compare in terms of false positive rates, what effect does the stability of the environment into which they are deployed have upon their accuracy, how these compare in terms of performance as time goes on and how they compare in terms of allowing the type of attack to be determined.
I Attachment Action Size Date Who CommentSorted ascending
12-IDS.pdfpdf 12-IDS.pdf manage 2 MB 14 Jan 2012 - 16:47 Main.ian  
NWEN405-lecture17-network-threats.pdfpdf NWEN405-lecture17-network-threats.pdf manage 896 K 14 Jan 2012 - 16:48 Main.ian  
Reading-IDS.pdfpdf Reading-IDS.pdf manage 1 MB 14 Jan 2012 - 16:49 Main.ian  
stallings.pdfpdf stallings.pdf manage 2 MB 14 Jan 2012 - 16:50 Main.ian  
Contact Us | Section Map | Disclaimer | RSS feed RSS FeedBack to top ^

Valid XHTML and CSS | Built on Foswiki

Page Updated: 14 Jan 2012 by ian. © Victoria University of Wellington, New Zealand, unless otherwise stated