SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
James F. Kurose, Keith W. Ross
Chapter:
Computer Networks And The Internet
Exercise:
Review
Question:28 | ISBN:9780132856201 | Edition: 6

Question

Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

Consider the given data:

  • Alice and Bob are sending packets to each other over a computer network.
  • Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob

The following steps to list some of the malicious things Trudy can do from this position:

  • She can observe the contents of all the packet and possiblity to modify content of packets and sent appropriate receiver.
  • Trudy is chance to drop the packets from Alice to Bob or from Bob to Alice.
0 0

Discussions

Fadi Badarni

There are several malicious things Trudy can do from her position in the network:

  1. Man-in-the-middle attack: Trudy can intercept and read all the packets sent between Alice and Bob, allowing her to steal sensitive information such as login credentials, credit card numbers, or personal data.

  2. Modification of packets: Trudy can modify the packets sent between Alice and Bob, which can cause the information to be changed, corrupted or even cause the system to fail.

  3. Injection of malware: Trudy can inject malware into the packets sent between Alice and Bob, which can compromise the security of their devices.

  4. Denial of Service: Trudy can use the packets to flood the network and make the services unavailable to Alice and Bob, by sending a large number of packets to the network, which can cause the network to fail.

Post the discussion to improve the above solution.