Network Security: Attacks and Defense Strategies

UDP Protocol and the Ping-Pong Effect

In the UDP protocol, port 13 is used for the “daytime” service. A time server that receives a packet to its UDP port 13 will always return a packet to the requester’s IP and UDP port, indicating the server’s current time. If the server does not check the requester’s port number, an attacker can send out one packet to a daytime server and cause a ping-pong effect between two daytime servers.

The ping-pong attack in UDP-based services, such as the Daytime

Read More

Assembly Language: Stack, Addressing, RISC, and CISC

Stack

  • Activation record (aka Stack Frame): Section of stack containing procedure components
  • Call stack: Activation records stacked on each other
  • STD Call: Method of adding to the stack and using RET n to deconstruct the stack
  • Moves toward the heap. Starts at a high address and decrements when values are added
  • PUSH OFFSET value – is 32 bit or 4 bytes ex. zBYTE “Why are you looking at this?”, 0

Order of Adding to Stack:

  1. Passed parameters: By PUSHing before the procedure call
  2. Return address: By the procedure
Read More

Fundamental Programming Concepts and C Language Essentials

Introduction to Programming

Programming is the process of designing and writing instructions for a computer to perform specific tasks. These instructions are written in programming languages, such as Python, Java, C++, or JavaScript. The goal of programming is to solve problems, automate tasks, or create software applications.

What is a Programming Language?

A programming language is a formal set of rules and syntax that allows humans to communicate with computers. Programming languages provide the

Read More

FIR Filter Design and DFT/IDFT Computation Techniques

Experiment 11: FIR Filter Design Using Frequency Sampling

11.1: Low Pass Filter Design and Frequency Response

Design a Low Pass Filter as per the given specifications and plot the Frequency Response.


1. clc;
2. close;
3. clear;
4. delta1=0.1; // Attenuation
5. delta2=0.1;
6. fl=400; // Low Cut-Off Frequency
7. fh=500; // High Cut-Off Frequency
8. fs=8000; // Sampling Frequency
9. A=-20*log10(min(delta1:delta2));
10. w1=2*%pi*fl/fs;
11. w2=2*%pi*fh/fs;
12. temp=1+((A-8)/(2.285*((2*3.14*fh/fs)-(2*3.
Read More

RPM and YUM Package Management in Linux

Binaries:

Fundamental factors justifying the existence of packages:

  • Operating Units: Prevents installation of a package if not all necessary dependencies are installed.
  • Automation of Installation/Uninstallation: Allows users to try a utility and immediately remove it without leaving residual files.
  • Trivial Update Utility: Installation of a newer version of software is done automatically.
  • Control of Configuration Files: Updating a package does not remove configuration files. Guarantees conservation of
Read More

Essential Machine Learning Concepts and Techniques

What Mathematical Concept is Naive Bayes Based On?

Naive Bayes is based on Bayes’ Theorem, which is a probabilistic model used for classification tasks. It calculates the probability of a class given the input features. The core concept behind Naive Bayes is the conditional independence assumption, which assumes that the features are independent of each other given the class label. This assumption simplifies the computation, making Naive Bayes computationally efficient.

Bayes’ Theorem:

P(C∣X)=P(X∣C)

Read More