Investigate the botnet attack modules

Assignment Help Computer Networking
Reference no: EM132206066

Assessment - Evaluation of Botnet Attacks and its Mitigation Methods

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to analyse the botnet attacks in cybersecurity; evaluate available defensive resolutions, and recommend a security solution.

Students will be able to complete the following ULOs:
a. Analyse cyber security threats and attacks
b. Implement and evaluate security testing tools in a realistic computing environment

Assignment 1: Evaluation of Botnet Attacks and its Mitigation Methods

Assignment Description

Internet of Things (IoT), equipped with massively interconnected Cyber-Physical Devices (CPDs) is opening a new era of ubiquitous computing and smart communications. The IoT is expected to create many new business opportunities in smart home care, industry automation, and critical infrastructure protection.

To enable the prevalent IoT services, many of the small computing devices, which were considered unworthy and unintelligent, have been reformatted and given the cyber-communication capacity. This has enabled many smart applications, but on the other hand, it has created serious security problems as these devices are not properly configured for security. These CPDs are inherently lack the computing resources (CPU processing or computer memory); therefore, they are open to many serious attacks including hijacking attacks which will dupe them to be part of BOTNET attacks.

1624_figure.jpg

Figure 1: Example of Botnet Attack

The BOTNET attack is a serious problem in Cyber Security.

In this report, you are to investigate:
1. The Botnet attack modules/structures
2. Botnet attack types and their implications to the victim services
3. Evaluation of protective technologies
4. Recommendation of protective resolution
5. Conclusion and remarks on future works.

Your group report should include the following sections and subsections:

1. Introduction to botnet attack and a simple case example addressing the significance of this report.
2. The Botnet attack modules/structures
a. Modules
i. The attacker or master
ii. Handler
iii. Agents
iv. Victims
b. Botnet attack life cycle
i. Initial infection
ii. Secondary infection
iii. Connection or rally
iv. Malicious activities
v. Maintenance and upgrading
3. Botnet attack types and their implications to the victim services
a. Select at least three examples from the list1.
b. Evaluate their attack implication to the potential victim services
4. Recommendation of your choice of the mitigation solution
5. Conclusion and remarks on future works

Verified Expert

The task deals with security issues in Botnet. The type of attacks are described. The life cycle of botnet has been discussed. In addition, technologies and measures to prevent botnet attacks are explained in the paper with conclusion, future work and recommendations.

Reference no: EM132206066

Questions Cloud

Compute the solution to the system of equations : The requirement of b as a column vector seems a bit excessive as both row and column vectors are just 1D arrays as far as Matlab is concerned.
Access the data type is called autonumber : In access the data type is called "AutoNumber" in SQLServer it is called an identity field, Oracle is it called a "sequence". What do they do?
Write a matlab program in which you can enter : Write a Matlab program in which you can enter the studentID's of students and then the marks obtained by eac student out of 100.
Write a matlab function that computes precision : Write out the precision, and the base, along with the ratio of precision and base, in other words writeout base, precision and precision/base.
Investigate the botnet attack modules : create many new business opportunities in smart home care, industry automation, and critical infrastructure protection - Evaluation of Botnet Attacks
Write a method that accepts a minimum integer : Write a method that accepts a minimum integer and a maximum and prints a square line of increasing numbers.
Return the range of values in an array of integers : Write a method called range that returns the range of values in an array of integers.
Write a method called reminder that takes an integer : Write method distance to calculate the distance between two points (x1, y1) and (x2, y2). All numbers and return values should be of type double.
Write a method that will create and return the reference : Write a method that will create and return the reference of a 2D array containing the elements in transposed order of another 2D array passed as an argument.

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss four different types of wireless technologies

Discuss four different types of wireless technologies in a 350- to 700-word paper in APA format. Describe the characteristics and properties of each signal type, and how each can be used

  What are the best practice recommendations for wlan design

What are the best practice recommendations for wired LAN design?- What are the best practice recommendations for WLAN design?

  Write a paper on virtual private network

Write a paper on Virtual Private Network. In your paper, you need to discuss: VPN, Aadvantages and disadvantages of VPN and Protocols such as IPsec, PPTP, and PP2TP.

  Design and implement an snmp agent - generate skeleton code

Product the key elements to manage are the doors and the power switches. The doors have 2 states: open/closed and the switches have also 2 states ON/OFF

  List host addresses

Subnet the following address - 130.4.8.74 The goal is to subnet the above address and to produce 7 subnets and 350 hosts/subnet. Please show all of your work. I am looking for the following: 1. List Custom Subnet Mask 2. List Network Addresses 3. ..

  Research and find all network layer models

There are several network layer models proposed in the OSI model. Research and find all of them. Explain the differences between them.

  What are the differences between a hub, switch and router

What are the differences between a hub, switch and router? Describe scenarios when you would use a switch instead of a router and vice versa.

  Design a secure authentication technology

Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI

  Write down a 2- to 3-page paper explaining the pros and

write a 2- to 3-page paper describing the pros and cons of out-of-band network management as opposed to in-band

  Decide whether or not mobile computing iws synonymous

Decide whether or not mobile computing and wireless computing are synonymous. Provide at least two reasons to support your assertion and justify your response.

  Define the key terms related to the osi model

Define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed.

  Prepare a network diagram that have a new billboard

Prepare a network diagram that Have a new billboard or TV ad every month. Make sure that building being used to house the brewery website is clean every day.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd