Question: 1. [10 points] Suppose we could deploy a mechanism that would ensure IP source addresses always corresponded to the actual sender of a packet.
1. [10 points] Suppose we could deploy a mechanism that would ensure IP source addresses always corresponded to the actual sender of a packet. In other words, it is impossible for an attacker to spoof source addresses. Determine if this mechanism would completely eliminate each of the following attacks, i.e. this anti-spoofing mechanism would be enough to prevent exploitation of the threat without any additional mechanisms or assumptions. Briefly state why or why not. a) buffer overflow attacks b) tcp syn flooding c) tcp rst injection d) spam 2. [10 points] Consider an application called WalkOff that runs on top of TCP. The payload size for the TCP packet is 850 bytes. What would the size of the corresponding Ethernet frame be that contains this TCP packet encapsulated within it?
Step by Step Solution
3.51 Rating (154 Votes )
There are 3 Steps involved in it
Answer 1 a Buffer overflow attacks The mechanism to ensure IP source addresses correspond to the actual sender of a packet would not completely eliminate buffer overflow attacks Buffer overflow attack... View full answer
Get step-by-step solutions from verified subject matter experts
