In attendance:
Karl Levitt (KL), Jeff Rowe (JR), Chris Wee (CW), David O’Brien (DOB),
David Klotz (DK), and Steven Templeton (ST)
| X = primary target subnet | Y = other subnet | Zi = some other host site | ||||||
| X = broadcast address for X | Y = broadcast address for Y | Zi ÏX u Y | ||||||
| X = X - {X} | Y = Y - {Y} | |||||||
| Xi = some host in X | Yi = some host in Y | |||||||
| a = actual address of attacker Î {Zi,Xi} | ||||||||
| b = source address in attack packet Î {Zi, Xi, Yi, Y, X, Zj} | ||||||||
| g = destination address in attack packet Î {Xj, X} | ||||||||
| Cases: destination address of Attack = X | Attack: (a ,b ,g, icmp echo request) for Smurf | |||||||
|
|
|
|
||||||
|
|
|
|
||||||
|
|
|
|||||||
|
|
|
|||||||
|
|
|
|||||||
|
|
|
|||||||
|
|
|
|||||||
|
|
|
|
|
|||||
|
|
|
|
||||||
|
|
|
|||||||
|
|
|
|||||||
|
|
|
|
||||||
|
|
|
|||||||
|
|
||||||||
|
|
|
|||||||
