Identify type of ddos attack

Assignment Help Computer Network Security
Reference no: EM131462582

After completing this assessment, student's should be able to:

- Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain the major methodologies for secure networks and what threats they address

Assignment Description

Part A:

Distributed denial of service (DDoS) attacks present a significant security threat to corporations. In one study, covering a three-week period, investigators observed more than 12,000 attacks against more than 5000 distinct targets, ranging from well-known ecommerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. DDoS attacks make computer systems inaccessible by flooding servers, networks, or even end user systems with useless traffic so that legitimate users can no longer gain access to those resources. In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets. In recent years, the attack methods and tools have become more sophisticated, effective, and more difficult to trace to the real attackers, while defence technologies have been unable to withstand large-scale attacks. A denial of service (DoS) attack is an attempt to prevent legitimate users of a service from using that service. When this attack comes from a single host or network node, then it is simply referred to as a DoS attack. A more serious threat is posed by a DDoS attack. In a DDoS attack, an attacker is able to recruit a number of hosts throughout the Internet to simultaneously or in a coordinated fashion launch an attack upon the target.

301_Figure.jpg

Figure

1) Using the given DDoS attack diagram in Figure 1, identify type of DDoS attack and justify in detail how this attack will affects the Victim's workstation.

2) Discuss atleast two solutions how this attack can be avoided or mitigated.

Part B:

It is important for networking professionals to stay abreast of new security threats and learn how to address them. In this task, you will look at some web resources that can help you find out about vulnerabilities on your network. For this task, you will need a workstation with internet connectivity and a web browser.

1) Connect to the internet and point your browser to the following:

https://technet.microsoft.com/en-us/security/advisories

2) View the entire list of published security advisories. Scroll through and find any two vulnerabilities related to Microsoft product that's familiar to you such as windows, web browsers or Microsoft office. Click the advisory's title and number in the left column to view the entire announcement.

3) Read the description of the problem and how it has been addressed. How was the problem discovered and reported? How could someone exploit this vulnerability? Does the potential vulnerability belong to any of the categories you learned such as DDoS, Brute Force, Phishing etc? What are the potential damages this vulnerability could cause, if exploited?

Verified Expert

The report covers part A and Part B. In part A, type of DDoS identified is typical. In detail it has been discussed that how this attack will affects the victim's workstation. solutions to avoid or mitigate this attack has been discussed. In Part B, The two selected vulnerabilities are: i) Update to Cipher Suites for FalseStart ii) Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege The paper is prepared for 18-00 words. Font used is Calibri, 11pt. Referencing style IEEE Reference Order.

Reference no: EM131462582

Questions Cloud

List the four major print media and give an advantage : List the four major print media, and give an advantage and a disadvantage of each. Which types of firms use radio, television, and the Internet?
Explain the limitations of a cvp analysis : Explain how a CVP analysis would be useful for determining whether or not the investment is worth it.Explain the limitations of a CVP analysis.
Write out and explain your empirical model : In your write-up, you need to describe your data, write out and explain your empirical model, and offer a detailed discussion of your results.
Write a three-page paper on hemophilia : Write a three-page paper on hemophilia it needs to include treatments for the condition as well as symptoms and prognosis
Identify type of ddos attack : BN203-identify type of DDoS attack and justify in detail how this attack will affects the Victims workstation-Discuss atleast two solutions.
What are the major tasks involved in managing a sales force : Identify and give examples of the three major types of salespersons. Explain how each step in the personal-selling process leads to the next step.
Partial pressure of the most polar gas : A 1.0 L vessel containing 1 mole of gas molecules at 250 °C has a composition that is 5% CO2, 60%N2, 10% SO2, and 25% He.
Corporate bond with an original maturity of ten years : A corporate bond with an original maturity of ten years and a face value of $1,000,000.
Describe three mystical moments : describe three mystical moments (premonitions, insightful dreams, clairvoyant thoughts, synchronistic moments, etc...)

Reviews

inf1462582

5/6/2017 2:00:51 AM

There is everything right in the assignment i requested that utilization the contingent administrator as opposed to utilizing the Decision structures. I adored the expert and would need for my future task. Thanks team.

inf1462582

5/6/2017 1:55:11 AM

please be careful about the criteria of the assignment because last time your expert didn't fulfill 1-2 things as per criteria of assignment then i was completed that within 1 night by my own before the submission date and submitted incomplete assignment. although it did not take so much time but still please take care. So please this time be careful. Thanks and please use academic reference from google scholar and reference's article,journals should not be older more than 4 year you have to change 3 little things in Assignment 1)I need a introduction and conclusion for the second part also.I am attaching a picture what description i need in introduction and conclusion for part 2 2)Please modify and replace all first person i,you and we.We can't use these in assignment. 3)I need in-text reference and reference according to IEEE style 22775849_1Capture.JPG

len1462582

4/14/2017 5:12:00 AM

Grade Mark HD 80%+ D 70%-79% Excellent Very Good Identification and Analysis and description Highly valid and appropriate Valid and appropriate Explanation/ justification All elements are present and well integrated. Components present with good cohesion Reference style Clear styles with excellent source of references. Clear referencing/ style Presentation and diagrams Proper writing and drawing. Professionally presented Properly written and drawing, with some minor deficiencies

len1462582

4/14/2017 5:11:40 AM

hi can u tell me how much will be the price for this assignment and i need it. After knowing these information then i will give order. How could someone exploit this vulnerability? Does the potential vulnerability belong to any of the categories you learned such as DDoS, Brute Force, Phishing etc? What are the potential damages this vulnerability could cause, if exploited?

Write a Review

Computer Network Security Questions & Answers

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Explain the relationship between morality and ethics

In readings and class discussions we have talked about the relationship and distinctions between morality and ethics. Morality deals with basic principles of right and wrong or good and bad. Ethics deals with behavior and actions.

  How do these standards reflect a changed environment

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Evaluate and select a security tool for recommendation

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. Evaluate and select a security tool for recommendation from the provided list of tools.

  Explain the key inherent dangers of the chosen threats

SEC 420- Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer.

  Why is a firewall a good place to implement a vpn

Security decision making should be based on rational thinking and sound judgement. In this context critique five security design principles with suitable examples.

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Create a three-year organizational systems management plan

Create a 3-year organizational systems management plan incorporating current trends and security concerns. An ability for the organization to upgrade its network transmission speed or bandwidth during the 3-year plan and beyond.

  What is a proxy firewall and how is it different

COIS23001 - Network Security - What is a proxy firewall and how is it different from a network (or transparent) firewall and what does NAT stand for, and how does the mechanism work? Describe what, if any, security NAT provides (or fails to provide).

  Explain the challenges of attribution

Explain the challenges of attribution and how you believe this impacts cyber intelligence. Would you rank cyber threats above those of terrorism? Why or why not

  Choose descriptive variable names in all programs

Write a program named program31.py that prompts the user to enter an integer, then responds by identifying the input as either odd or even as appropriate.

  Identify and discuss vulnerabilities and threats

Identify and discuss vulnerabilities and threats - develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd