Preview

Individual Assignment 1

Best Essays
Open Document
Open Document
2342 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Individual Assignment 1
Individual Assignment 1
October 13, 2013
CSEC 640
Table of Contents

1 Introduction
Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical



Cited: Gupta, B. B., Joshi, R. C., & Misra, M. (2012). Distributed Denial of Service Prevention Techniques. Kuppusamy, K. K., & Malathi, S. S. (2012). Prevention of Attacks under DDoS Using Target Customer Behavior. International Journal Of Computer Science Issues (IJCSI), 9(5), 301-307. Zade, A. R., Patil, S. H., & Salunke, D. T. (2011). A Novel Technique for Detection and Prevention of Distributed Denial of Service Attack. Advances In Computational Sciences & Technology, 4221-225

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Hostile users send a flood of fake requests to a server, overwhelming it and making a connection between the server and legitimate clients difficult or impossible to establish. The distributed denial of service (DDoS) allows the hacker to launch a massive, coordinated attack from thousands of hijacked (zombie) computers remotely controlled by the hacker. A massive DDoS attack can paralyze a network system and bring down giant websites. For example, the 2000 DDoS attacks brought down websites such as Yahoo! and eBay for hours. Unfortunately, any computer system can be a hacker’s target as long as it is connected to the Internet. DoS attacks can result in significant server downtime and financial loss for many companies, but the controls to mitigate the risk are very technical. Companies should evaluate their potential exposure to DoS attacks and determine the extent of control or protection they can afford Lin, P. (2006,…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Tian, Z. (2006). Defending against distributed denial-of -service attacks . DOI: Web Intelligence & Agent Systems; Sep2006, Vol. 4 Issue 3, p341-351, 11p, 3 Diagrams, 1 Chart, 4 Graphs…

    • 1656 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In last several years, Daniel of Service attack (DoS)/ Distributed Daniel of Service attack (DDoS) has become one of the most critical threats for internet security, though it’s easily accomplished by the intruders. Even, proven and practicable attacking software are also available on the Internet. To get rid of this attack, first of all we have to know its consequences.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Paradise Beach University (PBU) network specialists’ policy is to get involved in three different phases in fighting the denial of service attacks. During the first step, the network team will have to identify if the school is experiencing an attack and for the second step, the PBU’s specialists will have to find out if the attack has been implemented on the school’s network. For the final and most important phase, the network specialists will need to get involved in counteracting the attack.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    Song, K. (2004, February). The ABC 's of network security. Retrieved on November 1, 2005 from http://www.certmag.com/…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    An Overview Of Cyber Attack

    • 7324 Words
    • 29 Pages

    An Overview of Cyber Attack and Computer Network Operations Simulation Ian Chapman, Mélanie Bernier Centre for Operational Research and Analysis Defence Research and Development Canada Ian.Chapman@drdc-rddc.gc.ca Melanie.Bernier@drdc-rddc.gc.ca Sylvain P. Leblanc, Andrew Partington Computer Security Laboratory Royal Military College of Canada Sylvain.Leblanc@rmc.ca Keywords: Overview, Survey Paper, Cyber Attacks, Cyber Warfare, Computer Network Operations Cyber attacks have the potential to be extremely disruptive to a wired society. To understand some of the ramifications of these events, including their potential impact on the use of networks, the research community has begun the development of a number of applications to simulate cyber warfare.…

    • 7324 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Security Incidents

    • 2032 Words
    • 9 Pages

    In this document, the importance of security incidents is expressed as a high priority for any business that may possess valuable information. Computer networks are attacked more now than they have before, and in large numbers. There is a high demand for security within Information Technology to ensure that businesses, as well as their clients, do not fall victims to attacks that may compromise their assets. The categories of incidents explain the levels of risk according to the type of incident, as well as what classifies the incident levels. Security incidents are a major part of today’s world, and this document states the issues concerning the rise of e-commerce and products, such as software, that require access to the internet. Concluding the document is a brief example on how to identify and how to prevent a security incident by informing the reader what to look for as a potential threat and how to minimize vulnerabilities within a network.…

    • 2032 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Terrorism

    • 571 Words
    • 3 Pages

    The greater threat to our nation is not the cyber crimes against individuals such as identify theft but the potential terrorist cyber attacks on national institutions. Whereas, security theft, credit fraud and other cyber crimes against individuals have had devastating impact to our society and as pointed out by Anne Bordon (2007) the annual cost in the United States is estimated to be a staggering 500 million. Although, a notably significant amount this figure does not compare to the possible damages a cyber terrorist attack would impose to our country’s vital infrastructures. The many systems that Americans relay upon daily for banking, transportation, energy and national defense would have a devastating negative impact if subjected to a successful cyber attack. “Cyberwar would not be as lethal as atomic war, nor as visibility drastic but if a single large American bank were successfully attacked it could have an order-of-magnitude greater impact on the global economy than the Sept. 11, 2001, attacks” (Sanger, Markoff, and Shanker). Cyberwar and the constant cyber threats caused by the United States potential adversaries has caused for concerns to protect these system’s vulnerabilities. Our government and Department of Defense (DoD) are constantly implementing ways to increase their network defenses to prevent compromise to these systems through cyber attacks.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: ., Robert (December 29, 2008) Top 9 Network Security Threats in 2009. Retrieved October 17,2009, from:http://www.cgisecurity.com/2008/12/top-9-network-security-threats-in-2009.htmlCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 05,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/ito_doc.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 19,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/Intro-to-WAN.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 25,2009, fromhttp://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.htmlFortinet (n.d.) Solutions for Small to Medium Business (SMB/ROBO). Retrieved October 17,2009, from: http://www.fortinet.com/solutions/soho.htmlHallberg, B. (2005). Networking: A Beginner 's Guide. 4th ed. New York: McGraw-Hill/OsborneHeaton, Warren (2000, August 16) What 's the best WAN connection type for you?. RetrievedSeptember 19, 2009, from TechRepublic:http://articles.techrepublic.com.com/5100-10878_11-5033247.htmlMicrosoft Corporation (2002, March 16) Microsoft Remote Access Introduction and Overview.…

    • 6229 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    References: El-Moussa, F. A., Linge, N. N., & Hope, M. M. (2007). Active router approach to defeating denial-of-service attacks in networks. IET Communications, 1(1), 55-63. doi:10.1049/iet-com:20050441…

    • 637 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 10303 Words
    • 42 Pages

    Anonymous is the unknown person that possess his knowledgeable and ideology in his/her mind but also for me as one of them ill try to progress myself and other members too, but we are anonymous should be a nationality and protect the civil rights and internet freedom to all just be a quality student and programmer too.…

    • 10303 Words
    • 42 Pages
    Powerful Essays
  • Good Essays

    Cybercrime

    • 574 Words
    • 3 Pages

    Five of the most prevalent types of attacks: botnets, Advanced Persistent Threats (APTs), denial of service (DoS) attacks, viruses, worms and trojans and social engineering attacks to evaluate what impact they have on businesses, including their level of risk, motivations, types of information compromised and cost. As the study will show, there are significant differences in practices and perceptions among IT practitioners in all five countries.DoS attacks are considered to pose the greatest risk to organizations.…

    • 574 Words
    • 3 Pages
    Good Essays