Computer Networking : A Top-Down Approach

Computer Networking : A Top-down Approach

Authors: James F. Kurose, Keith W. Ross
ISBN: 9780132856201
Edition: 6
Chapter: Computer Networks And The Internet
Exercise: Review
Question: 28

 

Question by Anonymous on 08 May, 2016 at 08:21 AM

Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.

Answer by Geroge on 08 May, 2016 at 08:21 AM

Consider the given data:

  • Alice and Bob are sending packets to each other over a computer network.
  • Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob

The following steps to list some of the malicious things Trudy can do from this position:

  • She can observe the contents of all the packet and possiblity to modify content of packets and sent appropriate receiver.
  • Trudy is chance to drop the packets from Alice to Bob or from Bob to Alice.
0 0

Discussions

Post the discussion improve the above solution.