How can a web site distinguish between lack of capacity

Assignment Help Basic Computer Science
Reference no: EM13884623

How can a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL is shown on television during the broadcast of a popular sporting event. That spike in usage is the result of normal access that happens to occur at the same time.   How can a site determine that high traffic is reasonable?

 

Consider the following login protocol.

User knows password P

User knows Hash function H(.) and has a mobile calculator

User gives login name N to machine

Machine generates random number R

Machine gives R to user

User computes X:= Hash(P)  XOR  Hash(R)

User gives X to machine

Machine uses N to obtain P from password table

Machine computes Y:= Hash(P) XOR Hash(R)

If then machine allows login

a)Explain what is wrong with it and how can it be broken. 

b) Show a simple way to strengthen this protocol against your attack. 

Reference no: EM13884623

Questions Cloud

Explain the complexities of auditing a cloud computing : Explain the complexities of auditing a cloud computing deployment that uses the public model?
Consider the accompanying diagram : Consider the accompanying diagram. Ball A is allowed to fall and strike ball B. Assume that all of ball A's energy is transferred to ball B, at point I, and that there is no loss of energy to other sources.
Wireless mac protocols use csma/ca : Why do Wireless MAC protocols use CSMA/CA and not CSMA/CD? Explain why Wireless link layer protocols use acknowledgments whereas Wired ones typically do not.
Calculate the internal energy change : Calculate the internal energy change for each of the following. a. One hundred (100.) joules of work are required to compress a gas. At the same time, the gas releases 23 J of heat
How can a web site distinguish between lack of capacity : How can a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL is shown on television during ..
Explain distinction between safety cultureand safety climate : Explain the distinction between safety culture and safety climate
Describe your chosen architecture pattern : Describe your chosen architecture pattern. Explain why you selected the architecture of this case study.Explain how your chosen pattern could be applied to this case study.
What is the definition of communication : According to Introducing Communication Theory (2010), what is the definition of communication? What does communication mean to you personally? Provide an example.
Assignment uses a grading rubric : Assignment uses a grading rubric. Instructors will be using the rubric to grade the assignment; therefore, students should review the rubric prior to beginning the assignment to become familiar with the assignment criteria and expectations for succes..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw the project network diagram represented

Draw the project network diagram represented by the following situation:

  Explain about how device works

Write down what first comes to mind as to what is good and bad about the way the device works. The range of tasks a typical user would want to do using it.

  Impact of an instructional strategy

we discussed the importance of planning your instructional strategy. What are the components of an instructional strategy? How important is the room layout and what impact does it have on the effectiveness of training? What are some of the charact..

  What is the advantage of using the conditional operator

What is the advantage of using the conditional operator. Explain the rules of operator precedence and how an expression using numeric values and operators would be evaluated.

  Solve the following logcal problems

Solve the following logcal problems: a. 10110001 OR 00011010 b. 11100110 XOR 10111011

  Prepare the case budget for the fourth quarter

Using a spreadsheet to prepare the case budget for the fourth quarter. The cash budget should be included as an appendix to the written report and should be referenced in the written report.

  Write a brief paragraph describing the application

4. Research an application of Fuzzy Sets/Fuzzy Logic. Write a brief paragraph describing the application (what is the problem it addresses; why was a Fuzzy System chosen as a solution; pros and cons of the Fuzzy solution; etc.). (and you must ..

  Class hierarchy to represent geometric figures

Design, build and test a class hierarchy to represent geometric figures including circles, triangles, squares, rectangles, polygons, and hexagons. Implement just minimum number of methods per each class to reflect a distinctive characteristic of a..

  Using information in the lesson 09 online content

Using information in the Lesson 09 Online Content

  Create and validate html documents

Describe the structure of the World Wide Web as interconnected hypertext documents and create and validate HTML documents.

  User defined objects with constructors

User defined objects with constructors A two dimensional array  Objects are an important part of this project. I want to see that you have an understanding of how to develop your own objects/classes.

  Paper about the inheritance structures of galaga.

Identify the parent and child classes and describe what each class has for events and data. If you are unfamiliar with Galaga, do a web search on the topic to find some resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd