CSCI862 System Security- Explain the method you used to obtain your distributions. Don’t go into…

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Order a Similar Paper HERE Order a Different Paper HERE

1. You have two puzzles with parameters as follows:
Puzzle A: One sub–puzzles. k = 7.
Puzzle B: Four sub-puzzles. k = 5.
You should provide, for both cases other than part (b), the following:
(a) The distribution of the number of cases that require each number of hashes. 1 Mark
(b) Explain the method you used to obtain your distributions. Don’t go into too many details or
show working, it’s more “I wrote a C++ program to … and then using … I …”. 0.5 Mark
(c) A graph of the distribution of the data above. 0.5 Mark
(d) The average number of hashes needed. 0.5 Mark
(e) The standard deviation for the distribution of the number of hashes needed. 0.5 Mark
You should assume that if there are N possible solutions you check the Nth by hashing even if all
others have failed and there has to be a solution.
2. Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests
on a system so that it is unable to respond to legitimate connection requests. Consider a server
system with a table for 512 connection requests. This system will retry sending the SYN-ACK
packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before
purging the request from its table. Assume that no additional countermeasures are used against this
attack and that the attacker has filled this table with an initial flood of connection requests. At
what rate (per minute) must the attacker continue to send TCP connection requests to this system
in order to ensure that the table remains full? Assuming that the TCP SYN packet is 64 bytes in
size. How much bandwidth does the attacker consume to continue this attack? 1 Mark