3. [10 points] Suppose an IDS is 90% accurate, so that there is a 10% chance...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
3. [10 points] Suppose an IDS is 90% accurate, so that there is a 10% chance of false positives or false negatives. There are 500,000 log entries registered by the IDS, where 200 of these entries are actual malicious events. How many times will the alarm be sounded and how many are false negatives? 4. [10 points] Suppose Bregman is trying to establish a TCP connection with Altuve. When Bregman sends the ACK response to complete the 3-way handshake, the sequence number is 128614593 and the acknowledgement number is 846280196. What are the sequence numbers for the SYN request and SYN- ACK reply packets? 5. [10 points] Seager wants to perform a DNS cache poisoning attack, where DNS IDs are 24 bits long. Based on the birthday paradox analysis, how many DNS requests and equal number of fake responses would he need to make in order to get a 40% chance of succeeding? 3. [10 points] Suppose an IDS is 90% accurate, so that there is a 10% chance of false positives or false negatives. There are 500,000 log entries registered by the IDS, where 200 of these entries are actual malicious events. How many times will the alarm be sounded and how many are false negatives? 4. [10 points] Suppose Bregman is trying to establish a TCP connection with Altuve. When Bregman sends the ACK response to complete the 3-way handshake, the sequence number is 128614593 and the acknowledgement number is 846280196. What are the sequence numbers for the SYN request and SYN- ACK reply packets? 5. [10 points] Seager wants to perform a DNS cache poisoning attack, where DNS IDs are 24 bits long. Based on the birthday paradox analysis, how many DNS requests and equal number of fake responses would he need to make in order to get a 40% chance of succeeding?
Expert Answer:
Answer rating: 100% (QA)
Question 3 Question 3 How many times will the alarm be sounded and how many are false negatives Given Total number of log entries 500000 Actual malici... View the full answer
Related Book For
Operating Systems Internals and Design Principles
ISBN: 978-0133805918
8th edition
Authors: William Stallings
Posted Date:
Students also viewed these programming questions
-
Collins invested $87,000 cash in the business. Paid $27,000 in cash for equipment. Performed services for cash amounting to $8,700. Paid $3,500 in cash for advertising expense. Paid $2,700 in cash...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
For the 747 that carried the Space Shuttles, consider the cylindrical strut that supported the nose of the Shuttle (see photo). Assuming potential flow about a cylinder, estimate the pressure on the...
-
The position of a particle moving along 12t2 2t, where r is in meters and t is in an r-axis is given by x = seconds. i Determine the acceleration of the particle at t = 3.0 s. ii What are the...
-
Argon (Table A.4) approaches a normal shock with V1 = 700 m/s, p1 = 125 kPa, and T1 = 350 K. Estimate (a) V2, and (b) p2. (c) What pressure p2 would result if the same velocity change V1 to V2 were...
-
Let A be a fixed 3 x 3 matrix; also let L: M33 M33 be defined by L(X) = AX - XA, for X in A33. Show that L is a linear transformation.
-
The lab-on-a-chip product in Figure 25.13 incorporates the inventions in the innovation map of Figure 25.10. Carry out a patent search to determine whether all of the technological inventions in...
-
Superb Drive-Ins borrowed money by issuing $6,000,000 of 4% bonds payable at 97.5. Requirements 1. How much cash did Superb receive when it issued the bonds payable? 2. How much must Superb pay back...
-
The Fibonacci number Fn is recursively defined as F(n) F(n-1)+F(n-2), where F(1) =1 and F(2) = 1. So, F(3) F(2)+F(1)=1+1=2, and so on. Write the MIPS assembly for the fib(n) function, which computes...
-
Consider an individual whose preferences are defined over bundles of non-negative amounts of each of two commodities. Suppose that this individual's preferences can be represented by a utility...
-
(a) What is the meaning of directional derivative of f(x, y)? (b) The temperature T (in degree Celsius) on a metal plate, located in the xy-plane, at any point (x,y) is given by T(x, y) = x sin 2y....
-
How can organizations minimize time, situational, and activity constraints that create biases when assessing the extent to which employees have made progress in achieving developmental goals. Discuss...
-
Many of you will find this article to be a wake-up call. Especially parents. Our first three years of life significantly impact multiple aspects of our adult life. Obviously, a three-year-old has...
-
In what ways does homozygosity influence the manifestation and severity of genetic disorders in individuals?
-
Suppose that there are only two bauxite-generating countries, Australia (country 1) with total cost function TC(q) = 20g, and Guinea (country 2) with total cost function TC(92) = 3092, where q,...
-
Four types of batteries are being evaluated by the facility supervisor. The economic estimates for the alternatives are shown in the following table. Lithium Factor Alternative Initial Investment...
-
Convert the following concentrations as indicated: 1. 50 mg/L Ca in aqueous solution as: (a) mol/L or M (b) eq/L or N (c) mg/L as CaCO3
-
For all of the following words, if you move the first letter to the end of the word, and then spell the result backwards, you will get the original word: banana dresser grammar potato revive uneven...
-
Maximum urgency first (MUF) is a real-time scheduling algorithm for periodic tasks. Each task is assigned an urgency that is defined as a combination of two fixed priorities and one dynamic priority....
-
In a number of early computers, an interrupt caused the register values to be stored in fixed locations associated with the given interrupt signal. Under what circumstances is this practical...
-
An interactive system using round-robin scheduling and swapping tries to give guaranteed response to trivial requests as follows: After completing a round-robin cycle among all ready processes, the...
-
What are the different methods of conducting marketing research?
-
What is the main difference between a full-service and a limited-service supplier?
-
What are some of the issues that should be considered when conducting marketing research?
Study smarter with the SolutionInn App