Preview

Individual Assignment 1

Best Essays
Open Document
Open Document
2342 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Individual Assignment 1
Individual Assignment 1
October 13, 2013
CSEC 640
Table of Contents

1 Introduction
Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical



Cited: Gupta, B. B., Joshi, R. C., & Misra, M. (2012). Distributed Denial of Service Prevention Techniques. Kuppusamy, K. K., & Malathi, S. S. (2012). Prevention of Attacks under DDoS Using Target Customer Behavior. International Journal Of Computer Science Issues (IJCSI), 9(5), 301-307. Zade, A. R., Patil, S. H., & Salunke, D. T. (2011). A Novel Technique for Detection and Prevention of Distributed Denial of Service Attack. Advances In Computational Sciences & Technology, 4221-225

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Tian, Z. (2006). Defending against distributed denial-of -service attacks . DOI: Web Intelligence & Agent Systems; Sep2006, Vol. 4 Issue 3, p341-351, 11p, 3 Diagrams, 1 Chart, 4 Graphs…

    • 1656 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    Song, K. (2004, February). The ABC 's of network security. Retrieved on November 1, 2005 from http://www.certmag.com/…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    References: ., Robert (December 29, 2008) Top 9 Network Security Threats in 2009. Retrieved October 17,2009, from:http://www.cgisecurity.com/2008/12/top-9-network-security-threats-in-2009.htmlCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 05,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/ito_doc.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 19,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/Intro-to-WAN.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 25,2009, fromhttp://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.htmlFortinet (n.d.) Solutions for Small to Medium Business (SMB/ROBO). Retrieved October 17,2009, from: http://www.fortinet.com/solutions/soho.htmlHallberg, B. (2005). Networking: A Beginner 's Guide. 4th ed. New York: McGraw-Hill/OsborneHeaton, Warren (2000, August 16) What 's the best WAN connection type for you?. RetrievedSeptember 19, 2009, from TechRepublic:http://articles.techrepublic.com.com/5100-10878_11-5033247.htmlMicrosoft Corporation (2002, March 16) Microsoft Remote Access Introduction and Overview.…

    • 6229 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Businesses today must manage growing risks to their mission critical networks from attacks such as spyware, rogue wireless LANs, compromised remote/VPN users, DDOS attacks, system misconfigurations, and unpatched OS 's, all of which increase the risk of a network breach and interruption to both sales and business operations.…

    • 1280 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cyber Terrorism

    • 571 Words
    • 3 Pages

    The greater threat to our nation is not the cyber crimes against individuals such as identify theft but the potential terrorist cyber attacks on national institutions. Whereas, security theft, credit fraud and other cyber crimes against individuals have had devastating impact to our society and as pointed out by Anne Bordon (2007) the annual cost in the United States is estimated to be a staggering 500 million. Although, a notably significant amount this figure does not compare to the possible damages a cyber terrorist attack would impose to our country’s vital infrastructures. The many systems that Americans relay upon daily for banking, transportation, energy and national defense would have a devastating negative impact if subjected to a successful cyber attack. “Cyberwar would not be as lethal as atomic war, nor as visibility drastic but if a single large American bank were successfully attacked it could have an order-of-magnitude greater impact on the global economy than the Sept. 11, 2001, attacks” (Sanger, Markoff, and Shanker). Cyberwar and the constant cyber threats caused by the United States potential adversaries has caused for concerns to protect these system’s vulnerabilities. Our government and Department of Defense (DoD) are constantly implementing ways to increase their network defenses to prevent compromise to these systems through cyber attacks.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In last several years, Daniel of Service attack (DoS)/ Distributed Daniel of Service attack (DDoS) has become one of the most critical threats for internet security, though it’s easily accomplished by the intruders. Even, proven and practicable attacking software are also available on the Internet. To get rid of this attack, first of all we have to know its consequences.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    References: El-Moussa, F. A., Linge, N. N., & Hope, M. M. (2007). Active router approach to defeating denial-of-service attacks in networks. IET Communications, 1(1), 55-63. doi:10.1049/iet-com:20050441…

    • 637 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 10303 Words
    • 42 Pages

    Anonymous is the unknown person that possess his knowledgeable and ideology in his/her mind but also for me as one of them ill try to progress myself and other members too, but we are anonymous should be a nationality and protect the civil rights and internet freedom to all just be a quality student and programmer too.…

    • 10303 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    An Overview Of Cyber Attack

    • 7324 Words
    • 29 Pages

    An Overview of Cyber Attack and Computer Network Operations Simulation Ian Chapman, Mélanie Bernier Centre for Operational Research and Analysis Defence Research and Development Canada Ian.Chapman@drdc-rddc.gc.ca Melanie.Bernier@drdc-rddc.gc.ca Sylvain P. Leblanc, Andrew Partington Computer Security Laboratory Royal Military College of Canada Sylvain.Leblanc@rmc.ca Keywords: Overview, Survey Paper, Cyber Attacks, Cyber Warfare, Computer Network Operations Cyber attacks have the potential to be extremely disruptive to a wired society. To understand some of the ramifications of these events, including their potential impact on the use of networks, the research community has begun the development of a number of applications to simulate cyber warfare.…

    • 7324 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Distributed Denial-of-Service (DDoS) attacks are among the most established and pricey forms of such attacks, posing a serious threat to online businesses. During a DDoS attack, remote attackers generate a flood of traffic to a specific destination to disrupt a targeted website or server. The attack can come from one or multiple compromised machines or large networks of infected computers (i.e. botnets) to flood the target with high volumes of illegal traffic. As the targeted systems strain to keep up with the inundation, the subsequent slowdown/shutdown blocks legitimate users from access. The goal of most DDoS attacks is to force the targeted computing resources completely offline. The assailants succeed most of the time.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Botnet Paper

    • 1014 Words
    • 3 Pages

    This paper will define botnets and how they are developed, used and controlled. The malicious attacks such as distributed denial of service (DDoS) will be discussed along with recent DDoS attacks and the likely perpetrators and their motives. Finally, I will describe what protocols and systems are used by attackers use to control and update botnets today.…

    • 1014 Words
    • 3 Pages
    Good Essays