Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) Assume a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. Such as, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

(a) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? Describe why or why not.

(b) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic still reaches the hijacked IP blocks? Describe.

(c) In response to this attack, assume all ASes agree to check central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Like, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

(d) Assume a solution was devised where IANA hosted a server on the Internet which was able to validate all AS paths. Suppose that this server is always trustworthy and paths are valid if and only if the server says so.
State true or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

problem 2) Why do we require to infer ISP relationships? Why is this information not publicly available?

problem 3) Why would ISPs select to have peering relationships if it means they transport packets for free?

problem 4) Why do ISPs attempt to make sure valley-free routes?

problem 5) Despite the fact that ISPs have set relationships (i.e. provider/customer, peering, etc) based on contractual agreements, execution and management of these policies is not simple. A single misconfigured router within an AS (ie. one with incorrect import and/or export rules) can break these policies. What is a possible solution for this?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96682

Have any Question? 


Related Questions in Computer Network & Security

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro