Identify type of ddos attack

Assignment Help Computer Network Security
Reference no: EM131462582

After completing this assessment, student's should be able to:

- Discuss common threats and attacks on networked information systems
- Identify network threats
- Explain the major methodologies for secure networks and what threats they address

Assignment Description

Part A:

Distributed denial of service (DDoS) attacks present a significant security threat to corporations. In one study, covering a three-week period, investigators observed more than 12,000 attacks against more than 5000 distinct targets, ranging from well-known ecommerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. DDoS attacks make computer systems inaccessible by flooding servers, networks, or even end user systems with useless traffic so that legitimate users can no longer gain access to those resources. In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets. In recent years, the attack methods and tools have become more sophisticated, effective, and more difficult to trace to the real attackers, while defence technologies have been unable to withstand large-scale attacks. A denial of service (DoS) attack is an attempt to prevent legitimate users of a service from using that service. When this attack comes from a single host or network node, then it is simply referred to as a DoS attack. A more serious threat is posed by a DDoS attack. In a DDoS attack, an attacker is able to recruit a number of hosts throughout the Internet to simultaneously or in a coordinated fashion launch an attack upon the target.

301_Figure.jpg

Figure

1) Using the given DDoS attack diagram in Figure 1, identify type of DDoS attack and justify in detail how this attack will affects the Victim's workstation.

2) Discuss atleast two solutions how this attack can be avoided or mitigated.

Part B:

It is important for networking professionals to stay abreast of new security threats and learn how to address them. In this task, you will look at some web resources that can help you find out about vulnerabilities on your network. For this task, you will need a workstation with internet connectivity and a web browser.

1) Connect to the internet and point your browser to the following:

https://technet.microsoft.com/en-us/security/advisories

2) View the entire list of published security advisories. Scroll through and find any two vulnerabilities related to Microsoft product that's familiar to you such as windows, web browsers or Microsoft office. Click the advisory's title and number in the left column to view the entire announcement.

3) Read the description of the problem and how it has been addressed. How was the problem discovered and reported? How could someone exploit this vulnerability? Does the potential vulnerability belong to any of the categories you learned such as DDoS, Brute Force, Phishing etc? What are the potential damages this vulnerability could cause, if exploited?

Verified Expert

The report covers part A and Part B. In part A, type of DDoS identified is typical. In detail it has been discussed that how this attack will affects the victim's workstation. solutions to avoid or mitigate this attack has been discussed. In Part B, The two selected vulnerabilities are: i) Update to Cipher Suites for FalseStart ii) Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege The paper is prepared for 18-00 words. Font used is Calibri, 11pt. Referencing style IEEE Reference Order.

Reference no: EM131462582

Questions Cloud

List the four major print media and give an advantage : List the four major print media, and give an advantage and a disadvantage of each. Which types of firms use radio, television, and the Internet?
Explain the limitations of a cvp analysis : Explain how a CVP analysis would be useful for determining whether or not the investment is worth it.Explain the limitations of a CVP analysis.
Write out and explain your empirical model : In your write-up, you need to describe your data, write out and explain your empirical model, and offer a detailed discussion of your results.
Write a three-page paper on hemophilia : Write a three-page paper on hemophilia it needs to include treatments for the condition as well as symptoms and prognosis
Identify type of ddos attack : BN203-identify type of DDoS attack and justify in detail how this attack will affects the Victims workstation-Discuss atleast two solutions.
What are the major tasks involved in managing a sales force : Identify and give examples of the three major types of salespersons. Explain how each step in the personal-selling process leads to the next step.
Partial pressure of the most polar gas : A 1.0 L vessel containing 1 mole of gas molecules at 250 °C has a composition that is 5% CO2, 60%N2, 10% SO2, and 25% He.
Corporate bond with an original maturity of ten years : A corporate bond with an original maturity of ten years and a face value of $1,000,000.
Describe three mystical moments : describe three mystical moments (premonitions, insightful dreams, clairvoyant thoughts, synchronistic moments, etc...)

Reviews

inf1462582

5/6/2017 2:00:51 AM

There is everything right in the assignment i requested that utilization the contingent administrator as opposed to utilizing the Decision structures. I adored the expert and would need for my future task. Thanks team.

inf1462582

5/6/2017 1:55:11 AM

please be careful about the criteria of the assignment because last time your expert didn't fulfill 1-2 things as per criteria of assignment then i was completed that within 1 night by my own before the submission date and submitted incomplete assignment. although it did not take so much time but still please take care. So please this time be careful. Thanks and please use academic reference from google scholar and reference's article,journals should not be older more than 4 year you have to change 3 little things in Assignment 1)I need a introduction and conclusion for the second part also.I am attaching a picture what description i need in introduction and conclusion for part 2 2)Please modify and replace all first person i,you and we.We can't use these in assignment. 3)I need in-text reference and reference according to IEEE style 22775849_1Capture.JPG

len1462582

4/14/2017 5:12:00 AM

Grade Mark HD 80%+ D 70%-79% Excellent Very Good Identification and Analysis and description Highly valid and appropriate Valid and appropriate Explanation/ justification All elements are present and well integrated. Components present with good cohesion Reference style Clear styles with excellent source of references. Clear referencing/ style Presentation and diagrams Proper writing and drawing. Professionally presented Properly written and drawing, with some minor deficiencies

len1462582

4/14/2017 5:11:40 AM

hi can u tell me how much will be the price for this assignment and i need it. After knowing these information then i will give order. How could someone exploit this vulnerability? Does the potential vulnerability belong to any of the categories you learned such as DDoS, Brute Force, Phishing etc? What are the potential damages this vulnerability could cause, if exploited?

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd