Question: I need a response to the forum post with a question to ask about it.. don't know what questions to ask about it. so I
I need a response to the forum post with a question to ask about it.. don't know what questions to ask about it. so I need help with it.
1. There are multiple reasons why a network admin would decide onto using a black hole on their network, a majority of those reasons would be due to a malicious force on the other end of the network, a example would be a distributed denial of service (DDOS) attack towards the network, in which almost all utilized ICMP to communicate between the attacker and the victim. A problem with this is that it blocks all traffic going in and out which could stop all of the operations of a company.
2. Covert timing channel attacks have quite a few massive pros due to the way it exists as a "memoryless" attack, a major one is the near undetectability of one and the severe lacking of tools for finding one, it can disguise itself as normal system activities. A major disadvantage of covert timing channel attacks, is due to the fact it is not being stored anywhere as with it being memoryless, if it does not reach the receiver all of its data would be lost. Another con would be that it's assumed that CTC requires the system's clock, meaning if there was some way to create a virtual machine clock it would severely reduce the effect of a CTC, while on the other hand that may very much an impossible task for the moment due to the necessity of the clock for the runtime of machines.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
