Questionan ack scan does not provide in order about whether

Assignment Help Computer Engineering
Reference no: EM13348321

Question

An ACK scan does not provide in order about whether a target machine's ports are open or closed, except rather whether or not access to those ports is being blocked by a firewall. If there is no response or an ICMP "destination unreachable" packet is received as a response, then port is blocked by a firewall. If scanned port replies with a RST packet, then ACK packet reached its intended host. So end port is not being filtered by a firewall. Note, though, that port itself may be open or closed.

Describe a rule or a set of rules that might be used by Snort to detect an ACK scan. Cleary express your assumption and explain your rules. What do you think Bro can do a better job detecting an ACK scan? Describe your answer in details.

 

Reference no: EM13348321

Questions Cloud

Questionassume you want to sort a relation of 40 : questionassume you want to sort a relation of 40 gigabyteswith 4 kilobyte blocksusing memory size of 40 megabytes.
Questiona personal protective equipment are only used when : questiona personal protective equipment are only used when it has proven impractical to control occupational hazards by
Questiondotties tax facility specializes in federal tax : questiondotties tax facility specializes in federal tax returns for professional clients such as physicians dentists
Questionyou are the ciso for a fortune 500 online : questionyou are the ciso for a fortune 500 online auctioning company that is implementing big data technologies in
Questionan ack scan does not provide in order about whether : questionan ack scan does not provide in order about whether a target machines ports are open or closed except rather
Questioncreate the logic for program that performs : questioncreate the logic for program that performs arithmetic functions. design a program to contain two numeric
Question 1 a the standard service illuminance for specific : question 1 a the standard service illuminance for specific work activities is given in lux. what units are used in
Questioncreate the logic for program that performs : questioncreate the logic for program that performs arithmetic functions. design a program to contain two numeric
Questiondodocs contains tasks 1-7perform task 1-7 from : questiondo.docs contains tasks 1-7perform task 1-7 from backup services database -create the clients by service rep

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why choose database will return the k-th smallest value

as queries are expensive you would like to compute the median using as few queries as possible. Give an algorithm that fins the median value using at most O(logn) queries.

  Explain why you think the impact will or will not occur

Based on this description, the group should develop an analysis of the impacts such a development would have on one of the following: corporate sales and marketing, manufacturing, or management consulting.

  The algorithms of the parallel and perspective projection

I have a java application that reads in a vertex list and face list. I also have code to write 2-D lines and ouput that image file. In my code I have the standard 3D default values defined for: PRP and VRP reference points, VPN and VUP vectors, an..

  A word document with another office-type document

A compound document within Microsoft Office usually consists of a Word document with another office-type document (i.e. Excel, PowerPoint slideshow, etc.) within the Word document.

  Think about a cellular system with a total bandwidth

Think about a cellular system with a total bandwidth

  Dns servers and dhcp servers

Assume that both the DNS servers and the DHCP servers send your client PC and IP addresses. Write down the differences between these two addresses.

  Which is a method for copying a file or folder

Which of the following locations is not a valid place from that to delete a file and send it to the Recycle Bin.

  Protecting against the attack

Major corporations, governments, and the other organizations are hacked every week, mostly by the means of phishing the attacks. Explain how users and IT organizations must arm themselves against these attacks.

  Converting the skip list l into binary search tree t(l)

Any skip list L can be converted into binary search tree T(L)as follows: The root of T(L) is considered as the leftmost node on the highest non-empty level of L the left and right sub-trees.

  Designing a web page

In designing a web page, depending upon the information you are trying to convey, use of the tables may add the great deal of the organization on help clear any possible confusion on what you are trying to communicate.

  What is redundant data and why should it be avoided

What are the advantages of using relational databases in the development of interactive web applications.

  Identify any one provision of the patriot act

Identify any one provision of the PATRIOT Act that is considered potentially unconstitutional. Explain the objection. Do you agree that the provision is unconstitutional Why or why not If you could modify the PATRIOT Act, what changes would you mak..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd