Last Updated on July 31, 2021 by Admin
Which of the following describes a timing attack?
- delays attack for an amount of time
- waits for an opportune moment
- performs actions slower than normal
- performs actions faster than normal
Timing attacks are those in which operations carried out are done much slower than normal to keep the IPS or IDS from assembling the operation into a recognizable attack.
Performing actions faster than normal might even make it easier for the IPS or IDS to assemble the parts of the operation into a recognizable attack.
Delaying the attack will have no bearing how easily the IPS may or may not recognize the attack.
Attackers really have no way of recognizing or acting upon an opportune moment.
Objective: Attack Methods
Sub-Objective: Describe these evasion methods: Encryption and tunneling, Resource exhaustion, Traffic fragmentation, Protocol-level misinterpretation, Traffic substitution and insertion, Pivot.