Question

In: Computer Science

Explain how timestamping would be used in a protocol to mitigate replay attack.

Explain how timestamping would be used in a protocol to mitigate replay attack.

Solutions

Expert Solution

Replay attack :

For example: when one makes an order to the bank to transfer money to some specified account, the attacker may eavesdrop the frames. If that happens, the attacker can send the same (correct) messages to the bank one more time, hoping that the bank will transfer money again to the same account (probably connected with the intruder).

Using Timestamp to mitigate replay attack.

  • Measure for this type of attack is using timestamps on all messages. This prevents hackers from resending messages sent longer ago than a certain length of time, thus reducing the window of opportunity for an attacker to eavesdrop, siphon off the message, and resend it. But alone timestamp can’t prevent replay attack.
  • But we can use hash a time-stamp along with the user name and password, and close the window for replay attacks to within a couple of seconds. But still its partial solution only.

Related Solutions

Awesome depiction of how to mitigate an attack on privacy and credit card information. Our text...
Awesome depiction of how to mitigate an attack on privacy and credit card information. Our text discusses attacking your own network. Many firms hire outside consulting firms to do just that. Why hire outsiders to play a hacker and test our network? What are the benefits and risks? NMap 101: Fun With Firewalls! HakTip 102 (Links to an external site.) NMap 101: Fun With Firewalls! HakTip 102 Please respond in text format, no pictures or hand written. Also any reference...
Using the alkaline lysis protocol, explain how the following scenarios would affect the experimental outcome: a....
Using the alkaline lysis protocol, explain how the following scenarios would affect the experimental outcome: a. 100uL of solution 1 was added to a cell pellet, but the pellet was not re-suspended b. Solution 3 was made without potassium/sodium acetate
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain...
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b-...
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b- Explain the role of packet sniffing and protocol analyzers as used in intrusion detection systems c-List and specifically describe the 802.x Ethernet frame header fields that would be important to Network Forensic analysis d- List and specifically describe the 802.x Wireless Ethernet frame header fields that would be important to Network Forensic analysis
What is the 2PC protocol, and what is it used for?
What is the 2PC protocol, and what is it used for?
Explain the sliding window flow protocol and discuss the advantages of this protocol.
Explain the sliding window flow protocol and discuss the advantages of this protocol.
How do you see the media being delivered in the future? How would you mitigate the...
How do you see the media being delivered in the future? How would you mitigate the risk of selling media files via the Internet? CMGT/442 Information Systems Risk Management
Explain in detail how to develop a protocol for a species with no established aquaculture history.
Explain in detail how to develop a protocol for a species with no established aquaculture history.
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can...
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can be made towards DNS. Why, to-date, such attacks in practice have not been successful? In your answer, you should consider caching in particular. Why such technique has not only proven to provide better performance, which is its original goal, but also protection against security attacks.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT