Suppose the transaction ID for DNS queries can take values from 1 to 65,536 and is randomly chosen for each DNS request. If an attacker sends 1,024 false replies per request, how many requests should he trigger to compromise the DNS cache of the victim with probability 99%?

Respuesta :

Answer:

Explanation:

See the attached image to see answer.

Ver imagen hamzafarooqi188

The number of requests he should trigger to compromise the DNS cache of the victim with given probability is; R = 1622016 requests

What is the number of protocol requests?

According to RFC 542 Protocol manual, the number of fake requests that are people to be accepted is given by;

P_s = DRW/(NPI)

Where;

D is Average number of Identical outstanding queries of a resolver

R is the number of requests triggered per second by the attacker

W is the window of opportunity in seconds

N is the number of authorized name servers for a domain

P is the number of ports used

I is the number of ID's available

According to the RFC 542 Protocol manual, we have the values;

D = 1

W = 0.1

N = 2.5

P = 1

We are given;

P_s = 99% = 0.99 and I = 65536. Thus;

R = (N*P*I*P_s)/DW

R = (2.5 * 1 * 65536 * 0.99)/(1 * 0.1)

R = 1622016 requests

Read more about protocol requests at; https://brainly.com/question/26807014