In this chapter we have described sequence numbers between a sender and receiver as a way to protect a communication stream against substitution and replay attacks. Describe a situation in which an attacker can substitute or replay in spite of sequence numbers. For which type of sequence numbering—one general stream of sequence numbers or a separate stream for each pair of communicators—is this attack effective?

What will be an ideal response?


The attacker uses a message from one session, containing sequence numberx and attempts to insert/replay it with another session, assuming that sequence numberx will be valid in the new session. This kindof attack only works against the separate stream for each pair of communicators, assuming the messages do not contain a session ID.

Computer Science & Information Technology

You might also like to view...

Define Control Structures.

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements are true?

a. Inheritance models the is-a relationship between two classes. b. A strong is-a relationship describes a direct inheritance relationship between two classes. c. A weak is-a relationship describes that a class has certain properties. d. A strong is-a relationship can be represented using class inheritance. e. A weak is-a relationship can be represented using interfaces.

Computer Science & Information Technology

A background ________ is a slide background fill variation that combines theme colors in different intensities or patterns

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which answers are true regarding the Top-down design approach? (select 2)

A)Incorporates organizational requirements B)May result in inappropriate design C)More time consuming D)Based on previous experience E)Less time consuming F) Organizational requirements are not included

Computer Science & Information Technology