100% found this document useful (2 votes)
2K views3 pages

Bayes' Theorem and Security Concepts Tutorial

The document discusses several topics related to network security including: 1) Using Bayes' theorem to calculate probabilities of intrusion detection given normal and abnormal login behavior. 2) SQL injection attacks which allow manipulation of database queries. 3) A Markov model password checker which assigns different probabilities to letter combinations to strengthen passwords. 4) Calculating the expected time to crack a 4-character password either with or without feedback on incorrect guesses. 5) How adding a salt to password encryption increases security even though the salt is stored in plaintext, by requiring unique guesses per user rather than a single guess cracking multiple accounts.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views3 pages

Bayes' Theorem and Security Concepts Tutorial

The document discusses several topics related to network security including: 1) Using Bayes' theorem to calculate probabilities of intrusion detection given normal and abnormal login behavior. 2) SQL injection attacks which allow manipulation of database queries. 3) A Markov model password checker which assigns different probabilities to letter combinations to strengthen passwords. 4) Calculating the expected time to crack a 4-character password either with or without feedback on incorrect guesses. 5) How adding a salt to password encryption increases security even though the salt is stored in plaintext, by requiring unique guesses per user rather than a single guess cracking multiple accounts.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Tutorial week 12

1.

Question 1:

Working from the example in the lecture notes, using slightly different numbers: Say a network system has a population where 0.01 of the logins having intrusions. (The other 99% logins are having normal behaviours). When an intrusion occurs, the probability of detecting it as abnormality is 97%. Under normal operations, the probability of detecting it as abnormality is 9%. Using Bayess theorem, work out all the probability of:
i. ii. iii. iv.

When IDS shows abnormality, whats the probability of having an intrusion? When IDS shows abnormality, whats the probability of no intrusion? When IDS shows no abnormality, whats the probability of having an intrusion? When IDS shows no abnormality, whats the probability of no intrusion?

How do these numbers compare with the ones show in the lecture? Follow the lecture notes and let your students aware that Bayess theorem wont be in the exam :)

Question 2: Conduct some research from the Internet on the topic of SQL Injection. Discuss generally what does it do?
2.

General discussion, maybe show an example of SQL injection

Question 3: The Markov Model Password Checker in the lecture notes, show that if there are only three letters, a, b and c.
3.

a.

If 4 letters password is chosen, how many combinations can it be? 3^ 4 = 81?

b.

What is the advantage of having this Markov model password checker? It shows that the probabilities of letter combinations are not equal. Hence, it recommends users to choose passwords with less probability.

c.

Using this model, compute the probability of the following 4-letter word: babc caac abcc

i. ii. iii.

You may assume the initial probabilities for letter a, b and c is 0.5, 0.3 and 0.2 respectively.

Easy computation, just follow the model

d.

For the students whom can program, using uniform distribution random generator to generate 4 letters 1000 times, and to indicate their frequencies. Show to students the algorithm.

4.

Think again the problem stated in the lecture about using Operating Systems Page Faults for guessing password. The following question is a simplified version, where: Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of once per second.
a.

Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password? seconds. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password? = 52 seconds

b.

5.

It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 4096. But the slat is stored in plaintext in the same entry as the corresponding cipher text password. Therefore those two characters are known to the attacker and need not be guessed. Why it is asserted that the salt increases security?

Without the salt, the attacker can guess a password and encrypt it. If ANY of the users on a system use that password, then there will be a match. With the salt, the attacker must guess a password and then encrypt it once for each user, using the particular salt for each user.

You might also like