How can a web site distinguish between lack of capacity

Assignment Help Basic Computer Science
Reference no: EM13884623

How can a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL is shown on television during the broadcast of a popular sporting event. That spike in usage is the result of normal access that happens to occur at the same time.   How can a site determine that high traffic is reasonable?

 

Consider the following login protocol.

User knows password P

User knows Hash function H(.) and has a mobile calculator

User gives login name N to machine

Machine generates random number R

Machine gives R to user

User computes X:= Hash(P)  XOR  Hash(R)

User gives X to machine

Machine uses N to obtain P from password table

Machine computes Y:= Hash(P) XOR Hash(R)

If then machine allows login

a)Explain what is wrong with it and how can it be broken. 

b) Show a simple way to strengthen this protocol against your attack. 

Reference no: EM13884623

Questions Cloud

Explain the complexities of auditing a cloud computing : Explain the complexities of auditing a cloud computing deployment that uses the public model?
Consider the accompanying diagram : Consider the accompanying diagram. Ball A is allowed to fall and strike ball B. Assume that all of ball A's energy is transferred to ball B, at point I, and that there is no loss of energy to other sources.
Wireless mac protocols use csma/ca : Why do Wireless MAC protocols use CSMA/CA and not CSMA/CD? Explain why Wireless link layer protocols use acknowledgments whereas Wired ones typically do not.
Calculate the internal energy change : Calculate the internal energy change for each of the following. a. One hundred (100.) joules of work are required to compress a gas. At the same time, the gas releases 23 J of heat
How can a web site distinguish between lack of capacity : How can a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL is shown on television during ..
Explain distinction between safety cultureand safety climate : Explain the distinction between safety culture and safety climate
Describe your chosen architecture pattern : Describe your chosen architecture pattern. Explain why you selected the architecture of this case study.Explain how your chosen pattern could be applied to this case study.
What is the definition of communication : According to Introducing Communication Theory (2010), what is the definition of communication? What does communication mean to you personally? Provide an example.
Assignment uses a grading rubric : Assignment uses a grading rubric. Instructors will be using the rubric to grade the assignment; therefore, students should review the rubric prior to beginning the assignment to become familiar with the assignment criteria and expectations for succes..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd