Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) Assume a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. Such as, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

(a) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? Describe why or why not.

(b) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic still reaches the hijacked IP blocks? Describe.

(c) In response to this attack, assume all ASes agree to check central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Like, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

(d) Assume a solution was devised where IANA hosted a server on the Internet which was able to validate all AS paths. Suppose that this server is always trustworthy and paths are valid if and only if the server says so.
State true or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

problem 2) Why do we require to infer ISP relationships? Why is this information not publicly available?

problem 3) Why would ISPs select to have peering relationships if it means they transport packets for free?

problem 4) Why do ISPs attempt to make sure valley-free routes?

problem 5) Despite the fact that ISPs have set relationships (i.e. provider/customer, peering, etc) based on contractual agreements, execution and management of these policies is not simple. A single misconfigured router within an AS (ie. one with incorrect import and/or export rules) can break these policies. What is a possible solution for this?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96682

Have any Question? 


Related Questions in Computer Network & Security

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Lab questions1 when running snort ids why might there be no

Lab Questions 1. When running Snort IDS why might there be no alerts? 2. If we only went to a few web sites, why are there so many alerts? 3. What are the advantages of logging more information to the alerts file? 4. Wha ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

I have one question and need a response to the other

I have one question and need a response to the other part.  The question needs to be at least two paragraphs with in text references and the other response need to be at least one paragraph and no references. Part 1 - Q1 ...

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro