Is the proposed technique a promising

Assignment Help Basic Computer Science
Reference no: EM13922322

Individual Assignment #1

Description

The task of this individual assignment is to write a research paper/report.

Topic of the Paper:

Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks.

Assignment Guidelines

The following must be considered when you write the report:

Select 3-4 research papers (in addition to those provided/suggested) which discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:

The research papers must be published by a peer reviewed journal or be published in conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.).

You must not choose papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.).

Briefly explain your rationale for selecting a specific research paper.

Summarize each research paper and identify a combined total of three different detection, mitigation, or prevention techniques described in EACH of the papers you selected. For example: you can have a) one detection + two prevention methods, OR b) one detection + two mitigation methods, OR c) one detection + one prevention + one mitigation
Further Instructions:

Describe how each technique works. Clearly describe (in detail using your own words), how each technique works. Assume that you are explaining the author's technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and assume the student has no knowledge of the author's research (never read the article before). Discuss each technique or method using the following questions:

Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.

What are the strengths and weaknesses (limitations) of this technique?

Make sure there are No IPR (Intellectual Property Right) issues. This requires the following:

Re-draw all figures and tables.

Summarize all concepts using your own words.

Do not copy any part of text or unmodified figures (short quotes are acceptable.)

Cite references as needed using APA format.

To support your claims or statements, you may cite/reference non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs).

Submission Guidelines

Print format: MS Word or PDF format.
The general structure of your research paper:
Brief Intro
Background (if needed)
Main Sections
Conclusion (if needed)

References

The paper length: 6-10 double space pages (good, solid content which is factual, relevant, and concise), not including the cover page and reference page(s).

Follow the APA format.

Reference no: EM13922322

Questions Cloud

Federal vs. state policy comparison : Federal vs. State Policy Comparison [Pin It] Federal vs. State Policy Comparison Due May 18, Objectives: Format your paper consistent with APA guidelines. Properly cite your references/resource.
Roselle appliance uses a perpetual inventory system : Roselle Appliance uses a perpetual inventory system. For its flat-screen television sets, the January 1 inventory was 5 sets at $563.00 each. On January 10, Roselle purchased 7 units at $751.40 each. The company sold 3 units on January 8 and 5 units ..
Three primary project management organizational structures : In your paper, discuss the situation in which each structure would be the best method to manage a project team. Provide rationale for decisions.
What will happen if gravity becomes zero : What will happen if gravity becomes zero is it possible in earth?
Is the proposed technique a promising : Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer. What are the strengths and weaknesses (limitations) of this technique?
Agesim that you have witnessed in healthcare : What is one example of Agesim that you have witnessed in healthcare? How do you think agesim affects older adults? What do you think nurses can do to stop agesim in healthcare settings?
Planning analytical review for the financial statements : Perform the planning analytical review for the financial statements of Matty Kitchens, analyzing the key movements. Include supporting calculations.
Design and demonstrate an understanding of the principles : Describe the specific methods employed for collecting and processing all of the various sets of data - Compare the major approaches to research design and demonstrate an understanding of the principles and processes involved in developing and addre..
What is the expected number of units short per cycle : What ROP would provide a stockout risk of 10 percent during lead time? What is the expected number of units (pounds) short per cycle?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Construct and describe a tree

Construct and describe a tree that indicates the following: A college president has 2 employees who answer directly to him or her, namely a vice president and provost. The vice president and provost each have an administrative assistant.

  What will be the values of h1 and h2

Consider two cache organizations both of them are using 32KB cache,32 bit physical address and 32B blocks. The 1st one is 2-way set associative cache, 2nd one is direct mapped cache

  Critical infrastructure protection

According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  How fast can a telephone channel carry data

If a telephone channel's signal-to-noise ratio is 1000, how fast can a telephone channel carry data?

  Efforts to increase consumer awareness of products

Use of digital media within organizations has transformed how organizations communicate with prospective and current customers.

  Convert the binary number into a hexadecimal number

Pick the amount from one of the checks in your checkbook. ($50.24)1) Convert the decimal number into a binary number with three places to the right of the binary point.2) Convert the binary number into a hexadecimal number.

  In network cabling technology

In network cabling technology, what does the "100" in 100BaseT stand for?n network cabling technology, what does the "100" in 100BaseT stand for?

  Determine and print the average age of your family

Design a program that will allow a user to Input a list of your family members along with their age and state where they reside. Determine and print the average age of your family and print the names of anyone who lives in Oregon.

  Business rules that are reflected in the erd

Write the business rules that are reflected in the ERD shown below. (Keep in mind that the ERD reflects some simplifications. For example, this ERD states that each book is only written by one author, but in reality, there are many books written by m..

  What are difference between oop and object orinted design

What is the difference between object oriented programming and object oriented design

  Risk assessment section

Risk Assessment Section

  Quick fast car care application

Quick Fast Car Care is a small business that specializes in oil changes and car washes. Their strategic advantage is providing quick service. To provide quick service, this owner wants a new application that will calculate services provided to cus..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd