Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) Assume a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. Such as, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

(a) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? Describe why or why not.

(b) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic still reaches the hijacked IP blocks? Describe.

(c) In response to this attack, assume all ASes agree to check central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Like, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

(d) Assume a solution was devised where IANA hosted a server on the Internet which was able to validate all AS paths. Suppose that this server is always trustworthy and paths are valid if and only if the server says so.
State true or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

problem 2) Why do we require to infer ISP relationships? Why is this information not publicly available?

problem 3) Why would ISPs select to have peering relationships if it means they transport packets for free?

problem 4) Why do ISPs attempt to make sure valley-free routes?

problem 5) Despite the fact that ISPs have set relationships (i.e. provider/customer, peering, etc) based on contractual agreements, execution and management of these policies is not simple. A single misconfigured router within an AS (ie. one with incorrect import and/or export rules) can break these policies. What is a possible solution for this?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96682

Have any Question? 


Related Questions in Computer Network & Security

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen