Friday, August 9, 2019

Please reword the answers Essay Example | Topics and Well Written Essays - 250 words

Please reword the answers - Essay Example She impersonates a legitimate user to avoid detection. This makes the users think that the IP address for the printer is associated with the MAC (Media Access Control) address of Beatrice. Consequently, the software for the printer thinks that each of the users printing a document has Beatrice’s MAC address. As a matter of fact, Beatrice (as a man in the middle) passively eavesdrops on all the documents being sent by users to the printer. Describe a data structure for keeping track of all open TCP connections for a machine. The data structure should support e_ciently adding and deleting connections and searching by host, source port, and destination port. For the data structure, one needs to create a record for each connection of available TCP (transmission control protocol) connection and store all records in a double linked list Q. the double linked list ought to support insertions and deletions within constant time; assuming that a link to the record to be deleted/inserted is provided. In order to search competently for a TCP connection record by either using host or source port or destination port, create three search structures such as red-black trees or hash tables that store items of the type (x; y), in which x is the search key and y is a link to a connection record in Q. An intruder can get an upper hand by stealthily watching legitimate users for a week because by doing so he can determine what is normal and or accepted behaviors for each user (Shannon, p. 25-32). Consequently, he can try to mimic or imitate the noted behaviors of which minimize the probability of raising any intrusion alarms when he attacks the victim computer. All in all, the intruder would find it relatively easy to attack such a machine by watching and analyzing user’s behavior. Describe a modi_cation to the random port scan, as described in the previous

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.