Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
write the following iptables on the server to block the following traffic types originated from the attacker to the server:
- HTTP connection request from the attacker to the server.
- SSH connection request from the attacker to the server.
- FTP and Telnet requests ( Use single rule to block these multiple ports).
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 4 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Let's say Host C is a Web server that listens on port 80. Assume that this web server allows persistent connections and that it accepts requests from hosts A and B. Is Host C using the same socket to transmit each request? If they're broadcast over different sockets, do they both have port 80? You should talk about it and provide an explanation.arrow_forwardGiven the following Snort rule alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"SCAN SYN FIN";flags:SF; reference: arachnids,198; classtype:attempted- recon; sid:624; rev:1;) Question: If we were to re-define the above rule for packets coming from the EXTERNAL_NET using ports 20 through 25 (ftp through smtp), other than using the option key word or field 'any, how can we rewrite this rule? (Note: the rule must syntactically be correct so that Snort doesn't complain about incorrect rule.) Your Answer:arrow_forwardGiven the length filed in a UDP segment as 93 bytes, what is the size of application data in that segment?arrow_forward
- What does it mean when an HTTP query has a header field of "Connection: keep-alive"? a. The client can keep the TCP connection open for future requests/responses if this is supported by the server. O b. Use UDP for additional connections to the server. c. Continually send an object from the server to the client until the client has acknowledged receipt of the requested object. O d. Use the QUIC protocol for this connection.arrow_forwardTrue or False 1. After fast retransmit is invoked, fast recovery cuts the slow start period in half 2. A host sends a segment with a sequence number 35 and a payload of 5 Bytes. The ACK number in that segment is 40 3. TCP segments can only be lost when router queues overflow. Please explain if possible, Thank you!arrow_forwardPlease type your solution below for the question. d. Suppose the hash tables in the two bridges B1 and B2 are all updated.arrow_forward
- Question 23 A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2.1 ms, including the RTT. The browser then sends the request for the website's index file. The index file references 8 additional images, which are to be requested/downloaded by the client's browser. Assuming all other conditions are equal, how much longer would non-persistent HTTP take than persistent HTTP? (Give answer in milliseconds, without units, rounded to one decimal place. For an answer of 0.01005 seconds, you would enter "10.1" without the quotes.)arrow_forwardPlease write the steps to set up a server as DHCP server according to the following conditions: Setting up the Account Server Set the DHCP service onCreate a DHCP pool where:Pool Name: Your Name (Ex: Lionel Messi)Start IP address: Your ID (Ex: 20.22.12.18)arrow_forwardWhen a web client requests access to a web server's protected resources, show how native authentication and authorization services are used. To solve this problem, it is easiest to look at the following two justifications for layered protocols: Please provide concrete examples to support your arguments.arrow_forward
- A single link between two hosts can be used to send more than one file. Please tell me when shipments can be cleared. Is there a set amount of time for one wait and some flexibility with the other?arrow_forwardThe packets listed below were received by your network's stateful firewall, and they are shown in the following table in random order. The IP addresses of two hosts in your LAN, IP1 and IP2, and two external hosts, IP3 and IP4, are assumed to be IP1 and IP2, respectively. Indicate the number of established sessions and the number of half-formed sessions by evaluating these packets. established sessions. Packet Direction Pa1 Pa2 Pa3 Pa4 Pa5 раб Pa7 Pa8 Pa9 out Out in Out In in out out In Source IP IP1 IP2 IP3 IP2 IP4 IP4 IP2 IP1 IP4 Dest. IP IP3 IP4 IP1 IP4 O None of them IP2 IP2 IP4 IP3 IP2 Source Dest. Port Port 23 X 25 23 25 y y 80 X n y X y 25 25 n 23 80 SYN 1 1 1 0 1 0 1 0 1 ACK 0 1 1 1 0 1 1 1 0 O The number of established sessions=2 & The number of half established sessions = 1 The number of established sessions=0 & The number of half established sessions - 3 O The number of established sessions 2 & The number of half established sessions = 2 O The number of established…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education