January 31, 2024 Outline

Reading: text, §6.5, 7
Due: Extra Credit #C, due February 14; Project Progress Report, due February 16; Homework #3, due February 21

Module 24 (Reading: text, §6.5)

  1. Trust models

Module 25 (Reading: text, §7.1–7.3.1)

  1. Availability
    1. Deadlock
    2. Denial of Service

  2. Denial of service components

  3. Constraint-based model
    1. User agreement
    2. Finite waiting time policy
    3. Service specification policy

Module 26 (Reading: text, §7.3.2)

  1. State-based model
    1. Resource allocation system model
    2. Denial of service protection base
    3. Waiting time policy

Module 27 (Reading: text, §7.4)

  1. Availability and network flooding

  2. Countermeasures
    1. Manipulate opening of connection
    2. Control which packets get through, or the rate at which they get through

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 235B, Foundations of Computer and Information Security
Version of February 8, 2024 at 11:32PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh