Networking, Security, and Phishing Detection_ Application Layer & Protocols
0.0(0)
Studied by 0 people
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/77
There's no tags or description
Looks like no tags are added yet.
Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
78 Terms
1
New cards
Phishing Detection Tools
Tools that can detect phishing attacks by analyzing packet bits, such as Gigamon, Splunk, Syslog.
2
New cards
Application Layer Actions
Actions that include Web & HTTP, E-mail (SMTP, IMAP), DNS, P2P applications, Video streaming, Socket programming with UDP and TCP.
3
New cards
IMAP (Internet Message Access Protocol)
Allows email applications like Outlook to download emails onto a local machine instead of leaving them on the server.
4
New cards
DNS (Domain Name System)
Resolves a domain name into an IP address.
5
New cards
P2P Applications
Examples include payment apps and BitTorrent.
6
New cards
Socket Programming
Involves using UDP and TCP to send and receive messages through sockets.
7
New cards
Network Applications in Application Layer
Includes Social Networking, Web, Text Messaging, E-Mail, Multiplayer Games, Streaming, P2P File Sharing, VOIP, Real-Time Video Conferencing, Internet Search, Remote Login.
8
New cards
Socket in Networking
A 'door' through which a process sends and receives messages.
9
New cards
Sending Process Using a Socket
Shoves the message out the socket 'door,' relying on transport infrastructure to deliver it to the receiving socket.
10
New cards
Application-Layer Protocol Definition
Defines types of messages exchanged, message syntax, message semantics, rules for sending/responding to messages, and open or proprietary status.
11
New cards
Open Protocol Examples
HTTP, SMTP, among others, defined in RFCs.
12
New cards
Proprietary Protocol Example
Skype.
13
New cards
Transport Services Needed by Apps
Include data integrity, throughput, timing, and security.
14
New cards
Packet Throughput Requirement
If a packet doesn't meet throughput requirements, it must be resent.
15
New cards
Handling Delayed Packets
Time-sensitive apps discard delayed packets and use the latest ones to stay up to date.
16
New cards
Limitation of TCP and UDP
No encryption; cleartext passwords traverse the Internet unencrypted.
17
New cards
Encrypted TCP Connections
Provide data integrity and end-point authentication.
18
New cards
TLS Implementation Location
Implemented at the application layer; apps use TLS libraries that rely on TCP.
19
New cards
TLS Socket API Functionality
Cleartext sent into the socket is encrypted before traversing the Internet.
20
New cards
TLS Certificates Application
Applied to the NIC of servers to verify communication; certificate must be renewed if the NIC is replaced.
21
New cards
Port for Encrypted File Transfer
Port 22 (SSH).
22
New cards
Non-Persistent HTTP Definition
Opens a TCP connection, sends at most one object, then closes the connection; multiple connections are needed for multiple objects.
23
New cards
Persistent HTTP Definition
Opens a TCP connection, sends multiple objects over a single connection, then closes it.
24
New cards
TCP Connections Needed for a Webpage
11 connections needed for a webpage with text and 10 JPEGs in non-persistent HTTP.
25
New cards
POST Request Purpose
Sends user input to the server in the entity body of the request.
26
New cards
GET Request Data Sending
Includes user data in the URL field (following a '?').
27
New cards
HEAD Request Function
Requests only the headers that would be returned by a GET request for the specified URL.
28
New cards
PUT Request Function
Uploads a new file to the server, replacing the existing file at the specified URL.
29
New cards
Cookie Definition
A file on the client machine storing info about a web session, allowing state maintenance despite HTTP's stateless nature.
30
New cards
Components of Cookies
Include cookie header in HTTP response, cookie header in next HTTP request, cookie file on user's host, back-end database at the website.
31
New cards
Web Cache Definition
Satisfies client requests without involving the origin server; acts as both client and server.
32
New cards
Who Installs a Web Cache
Typically installed by ISPs, universities, companies, or residential ISPs.
33
New cards
Benefits of Web Caches
Reduce response time, reduce traffic on access links, and enable effective content delivery for poor providers.
34
New cards
Internet Caches Density Reason
Caches reduce traffic and improve delivery efficiency.
35
New cards
OSI Model Definition
Provides a theoretical framework for understanding how network communication works.
36
New cards
Layers in the OSI Model
Seven layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
37
New cards
Ethernet Layer
Belongs to the Data Link Layer (Layer 2).
38
New cards
Layer for IP Addressing and Routing
Network Layer (Layer 3).
39
New cards
Transport Layer Protocols
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
40
New cards
Function of the Transport Layer
Provides end-to-end communication and ensures data delivery reliability.
41
New cards
TCP Reliability
Ensures reliability by using sequence numbers and acknowledgments to track and reassemble packets.
42
New cards
Difference between TCP and UDP
TCP is reliable but slower; UDP is faster but less reliable.
43
New cards
Data Formatting Layer
Presentation Layer (Layer 6) is responsible for encrypting and formatting data.
44
New cards
Common Application Layer Protocols
Include HTTP, HTTPS, DNS, FTP, SMTP.
45
New cards
Encapsulation in Networking
The process of adding headers at each OSI layer before data transmission.
46
New cards
L4 Load Balancer
Operates at the Transport Layer (TCP/UDP).
47
New cards
L7 Load Balancer
Operates at the Application Layer (HTTP/HTTPS).
48
New cards
Domain Name System Function
Translates human-readable domain names (e.g., google.com) into machine-readable IP addresses.
49
New cards
Transport Layer Protocol for DNS
UDP (User Datagram Protocol), port 53.
50
New cards
Reason DNS Uses UDP
UDP is faster and more efficient for quick lookups.
51
New cards
Well-Known Port Definition
A pre-assigned port number used by common services, like UDP 53 for DNS and TCP 80 for HTTP.
52
New cards
Source Port Definition
A randomly selected port above 1024 that a client assigns to track its own outgoing requests.
53
New cards
Destination Port Definition
Indicates which service should handle the request on the receiving end (e.g., HTTP uses port 80).
54
New cards
Tracking Multiple Outgoing Requests
By assigning different source ports for each request.
55
New cards
MAC Address Definition
A unique hardware identifier assigned to network devices.
56
New cards
TCP/IP Stack Encapsulation
Adds headers at each layer of the TCP/IP stack before data is transmitted.
57
New cards
TCP/IP Stack Layers
Application, Transport, Network, Data Link, and Physical Layer.
58
New cards
Application Layer Function
Adds service-specific data (e.g., HTTP request).
59
New cards
Transport Layer Function
Adds TCP/UDP headers with source/destination ports.
60
New cards
Network Layer Function
Adds IP addresses to route the packet.
61
New cards
Data Link Layer Function
Adds MAC addresses for local delivery.
62
New cards
Physical Layer Function
Transmits bits over the network.
63
New cards
TCP vs UDP for Web Browsing
TCP ensures reliable delivery, while UDP is faster but can drop packets.
64
New cards
Ethernet Address at Layer 2
Identifies devices within a local network before packets are forwarded.
65
New cards
HTTPS Definition
A secure version of HTTP that encrypts communication using TLS.
66
New cards
TLS Definition
Transport Layer Security - the protocol that encrypts HTTPS traffic.
67
New cards
TLS Handshake Purpose
Establishes a secure connection between a client and server before encrypted data is exchanged.
68
New cards
Steps in the TLS Handshake
Client Hello, Server Hello, Key Exchange, secure communication begins.
69
New cards
Asymmetric and Symmetric Encryption in HTTPS
Asymmetric encryption (RSA) is used to exchange the symmetric session key, which encrypts bulk data.
70
New cards
Difference Between TLS 1.2 and TLS 1.3
TLS 1.3 reduces handshake time from two round trips to one round trip, improving speed.
71
New cards
Common Encryption Algorithms in TLS
RSA (older), Diffie-Hellman (modern), AES for bulk encryption.
72
New cards
Content Delivery Network (CDN) Definition
A network of distributed servers that caches content closer to users for improved speed.
73
New cards
Points of Presence (PoPs) in a CDN
Strategically placed servers that store cached content.
74
New cards
Routing Methods Used by CDNs
DNS-based routing and Anycast routing.
75
New cards
CDN Website Performance Improvement
Caches static content, reduces latency, and offloads traffic from origin servers.
76
New cards
Edge Computing in a CDN
Processes requests closer to users at the edge of the network, reducing response time.
77
New cards
CDN and Security
Mitigates DDoS attacks, provides TLS termination at the edge, and applies traffic filtering.
78
New cards
Reverse Proxy Role in a CDN
Handles requests for origin servers, caches content, and improves performance.