Term
What is the IP Address for? |
|
Definition
Same as registration plates |
|
|
Term
What is safe to keep in raw data? |
|
Definition
|
|
Term
What should you not do with packets? |
|
Definition
Store or monitor the content |
|
|
Term
Why would you want to store data? |
|
Definition
Application-level analysis ID tunnel-ed traffic Intrusion detection Share with research community |
|
|
Term
|
Definition
DHCP in organisations is relatively static For very short packets, the CRC can reduce the guesswork to reconstruct the packet |
|
|
Term
What three ways to anonymise? |
|
Definition
|
|
Term
|
Definition
Get rid of it (example 0.0.0.0) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Increase the IP address:
Ex. 10.0.0.1, 10.0.0.2, 10.0.0.3 |
|
|
Term
|
Definition
Network and compare anonymised trace with generated traffic
Identify servers. E.g proxy / web |
|
|
Term
Whom should see the information? |
|
Definition
Depends on the contract with the user |
|
|
Term
What's the problem with default windows vista installation? |
|
Definition
It allows file sharing for the 'local network' |
|
|
Term
What's the problem with default windows xp installation? |
|
Definition
Supports TCP options and doesn't respond to ICMP |
|
|
Term
|
Definition
traffic monitoring can be done only in the aggregation poins, no choice of monitoring local subnets |
|
|
Term
Virtual LANs are used for what? |
|
Definition
Used to segregate hosts connecting to the same switch |
|
|
Term
Firewalls are what for intrusive monitoring? |
|
Definition
|
|
Term
Why do we want a firewall? |
|
Definition
Network security cannot be ignored |
|
|
Term
What principles does NAT destroy? |
|
Definition
IP address uniqueness Remote endpoints cannot connect directly |
|
|
Term
Why does NAT cause problems with monitoring? |
|
Definition
Accounting traffic per IP address does not indicate individual performance |
|
|
Term
How can the number NAT thing be inferred? |
|
Definition
TTL / System fingerprinting IP ID field |
|
|
Term
Why are proxies bad for network monitoring? |
|
Definition
Any direct link between endpoints is severed |
|
|
Term
|
Definition
Describes an application embedding its traffic into another application |
|
|
Term
How is tunnelling detectable? |
|
Definition
Application-level analysis |
|
|
Term
What's VPN to network monitoring? |
|
Definition
|
|
Term
What two ways are there to identifying apps |
|
Definition
Signature and anomaly based |
|
|
Term
Why is port-based application identification not an option? |
|
Definition
|
|
Term
Why is privacy / anonomization bad for researchers? |
|
Definition
Increasingly difficult to gather information about network performance outside the controlled environment |
|
|
Term
Why are network managers ok with the privacy? |
|
Definition
Good balance between network security and its performance |
|
|
Term
Why is it quite good fo companies providing monitoring solutions? |
|
Definition
Means that people need ready-made solutions and expertise required to ID optimal solutions |
|
|