Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 3

Sure specify the domain and nature each wannacry

Due 10pm, September 24, 2021

Make sure you include referencing for answers where it would obviously be needed.

(a) The distribution of the number of cases that require each number of hashes. 1 Mark

(b) Explain the method you used to obtain your distributions. Don’t go into too many details or show working, it’s more “I wrote a C++ program to ... and then using ... I ...”. 0.5 Mark

2. Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 512 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used against this attack and that the attacker has filled this table with an initial flood of connection requests. At what rate (per minute) must the attacker continue to send TCP connection requests to this system in order to ensure that the table remains full? Assuming that the TCP SYN packet is 64 bytes in size. How much bandwidth does the attacker consume to continue this attack? 1 Mark

1

(b) BlueSmack. 0.5 Mark

(c) Emotet. 0.5 Mark

(b) Suppose that there is a lower and upper query size limit that satisfies

k ≤ |X(C)| ≤ N − k

4. If you need an extension apply through SOLS, if possible before the assignment deadline. 5. Plagiarism is treated seriously. Students involved will likely receive zero.

3

Copyright © 2009-2023 UrgentHomework.com, All right reserved.