Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ddos attacks evolution detection prevention reaction and tolerance

22/10/2021 Client: muhammad11 Deadline: 2 Day

Problem Statement- Identification And Prevention Of DDoS Attacks

Problem statement- Identification and prevention of DDoS Attacks

DoS attack prevents legitimate users from accessing the required resources from a network such as a website and computer systems. The attack occurs when a malicious user tries to consume all resources available to server hence blocking all services that legitimate users would like to access. The attack apart from consuming bandwidth, it also in some occasions consumes file space, memory as well as CPU. The server is overwhelmed by overloaded traffic making it unable to respond to the legitimate users till countermeasures are taken. On the other hand, Distributed Denial of Service attack is launched indirectly through compromised computing systems that facilitate coordinated attack on network or system. A Distributed Denial of Service (DDoS) can be considered to be a subset of a Denial of Service (DoS) and arises due to various principles of the internet which include resource sharing and accessibility. The DDoS attack, for instance, overwhelms web servers by consistently sending it data beyond its handling capabilities This attack attempts to disrupt the targeted system using the internet principles thus overwhelming legitimate users by denying them access to the system resources. The hacker ensures that there is a production of more traffic than the victim is in a position to handle by accumulating as many computers as possible thus the origin of the Distributed attack. There is need to identify these attacks, manage them as well as prevent them and look into ways of differentiating between malicious and legitimate users as it is a common persistent problem faced up to date.

DDoS attack network is of two types, the Agent- Handler model as well as Internet Relay Chat model. The former type comprises of clients where the attacker makes communication with other DDoS attack system, agents software which exists in the comprised system which is to carry the attack and handlers, which are located throughout the network where agent and clients communicate. The attacker usually communicates with handlers so as to identify the running agents, when the attacks should be scheduled and the best time to upgrade the agents. Internet Relay chat model, however, connect clients to agents via a form of communication instead of using a handler. DDoS attacks can be divided into two classes, that is, resource depletion attacks and bandwidth depletion attacks. Bandwidth depletion is projected to prevent legitimate users access primary resources by flooding uncontrolled traffic to the network while resource depletion is designed in a way that it ties up victim’s resources, hindering the network from accessing the legitimate users. The DDoS attack can easily consume computing resources without prior notice and within a very short period of time (Shannon, 2015). According to recent studies, DDoS attacks are likely to attack a network resource and majorly results from internet’s inability to manage bandwidth consumption attacks. In addition, they are likely to occur when hosts can send and receive resources from each other. The DDoS attack is regarded to be simple attacks since their installation is not complicated and are capable of compromising a server very fast and forestall users from accessing it. Subsequently, difficulties in designing effective control measures due to the indistinguishable nature of normal traffic and attacks. Past researchers show that the best way to manage the DDoS attack is by using preventive techniques as well as avoidance techniques, (Bhattacharyya & Kalita, 2016). In order to defend against DDoS attack, researchers have mostly focused on analytical studies. It is clear from the current DDoS attack around the world that these attacks are outgrowing based on the scale of attacks and sophistication level too. while the attacks targeting medium-sized firms peak at around 50 Gbps, large sized enterprises attacks are in a position to peak to 300 Gbps, for instance, the April 2013 largest historical DDoS attack that peaked at 300 Gbps slowing down internet worldwide. Therefore DDoS attack is major issues affecting the security of both public and private networks.

The approach to solving the networks and computers from being attacked is applying preventive measures and by using network simulation which simulates server system and network performance. DDoS can be prevented by configuring routers at the network layer when possible. In addition, administrative techniques can be used when configuring the routers is inappropriate. Another way of solving this problem is by blocking internet attacks from websites and can be done in various ways including blocking attacks with packet filers on a router. This is necessary when a close examination of attacks has been done. Likewise, the attacks can be blocked by configuring the firewalls. Considering a simple communication model established in this project, packet filtering is an effective way to block the DDoS attack as ingress filtering and egress filtering would be effective. Ingress filtering technique is used to ensure that incoming packets are free of manipulated IP address sources in their headers so that the computer is unable to trace the source of the attack. Incoming packets are usually filtered based on the prior information regarding unauthorized sending of packets to specific IP address. The idea based on ingress filtering is to prevent computer in the network from acting as another computer. Although this is the best way of solving the attack on the small network, it is rarely used by ISPs since filtering degrades the ISP network performance significantly. In addition, in ISP, filtering does not eliminate the DDoS attack but reduces spoofing. Despite this, it is an effective way considering the small-sized framework and has superseded the traditional old styles.

The approach outlined above will be sufficient in blocking attacks from computers and networks. using network simulation it is possible to design and produce safe, reliable, fast and cost-effective results unlike the traditional ways of focusing on analytical studies. an algorithm to categorize clients who send the attacks with the help of a database is possible in network simulation. The database categorizes the clients based on whether they are registered or not. Unregistered clients are blocked for a while until the completion of the peak season and are later unblocked and a response sent to them. In case of a registered client, they are provided with responses whether it is during the peak season or not or not using two types of methodologies, that is, access count and Warning count. This methodology prohibits access of non-registered users as well as to unregistered users who send multiple requests.

The DDoS attacks need faster control since they do not have a prior notice thus timing and scheduling of the action items is so essential. Sometimes a website may become inaccessible to many users leading to overloading of the server caused by maximum utilization resulting in severe performance and slow processing time, (Shannon, 2017). The DDoS attacks are sophisticated and eventually lead to catastrophic service failure. The attacks involve sending packets to the victims in high quantities such that vital resources in the network, memory and CPU time are exhausted. Eventually, the victim crashes or spends much of its time handling them and eventually fails to attend to its real work.

The aggressiveness to having the required mitigation skills to counter-attack DDoS attacks is an essential thing. Skills related to networking and application layers in the OSI model is a key thing given that attacks often occur around this areas. System administration skills are also vital by the virtue that they are covered in the web infrastructure.

There are many benefits of completing a project other than the satisfaction experienced by individuals and teams involved in the project. It is however of more benefits when the project concludes at the required time and within the budget confines. Project completion means that the desired results have been met and that project customers and shareholders benefit since they can access the resources without the interruptions of the attacks

Deliverable, defined as tangible or intangible results are the effective output of this project simulation. for instance, in a case where no attackers are placed in a network and two users are sending packets at a varying time, the incoming packets get served quickly hence active TCP connection counts. In a case where the huge amount of attack traffic occurs on the targeted server, the server is unable to handle the request demand and becomes overwhelmed since the server's resources are completely employed reducing memory size to 0 bytes. Blocking the attacks minutes into the DDoS attack lowers active TCP connection counts at the server and hence the network starts to recover faster. After the attack, however, CPU utilization of the server remains high for a given period of time due to the huge traffic waiting to be processed by the CPU and it generally has to take some time to drain the fully overwhelmed server. Thereafter, when the necessary mitigating approaches are taken, the server resumes its resources and is accessible by legitimate users. The simulation project can be characterized by the following vulnerabilities; one is distributed defense rather than a centralized defense of the DDoS attacks due to the high volume and rate of attack packets. Secondly, ensuring less collateral damage is a prime deliverable in this project, therefore, guarantying High Normal Packet Survival Ratio will be necessary. Third, the project will ensure confidentiality, secure exchange of information between defense nodes as well as the credibility of sources by ascertaining provision of secure information for controlled messages. Moreover, the project will successfully deliver a defense model which does not require centralized control. Lastly, the defensive project will take into account future characteristic issues like interfering with other systems. The above-advanced mitigation techniques or deliverables are expected at the end of the project since they protect the network system and computers from DDoS attacks.

References

Shannon, M. (2015). IINS: DDoS Attacks.

Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS attacks: Evolution, detection, prevention, reaction, and tolerance

Shannon, M. (2017). Security+: DoS and DDoS Attacks.

Problem Statement-Analyzing financial status using credit Score Rating

Financial institutions use credit scores of the consumers as a basis for issuing them loans and may have poor, fair, good or excellent credit scores and rating. Credit scores matters since it helps lenders anticipate on the likelihood of lending an individual a loan at any time. They are as well referred to as risk scores because they assist financial lenders to assess the risk of a customer failing to pay the issued debts or loans. The main problem experienced in financial analysis on basis of credit scores and rating is that customers are not in a position to realize there credit scores as the information is only available to the lenders or financial situation.

A credit score of 700 and above is considered generally good, while that of 800 and above is taken to be excellent but most of customer credit scores lie between 600 and 750. According to past research, there are two main types of credit scores including FICO Scores and Vantage Score although there exist industry-specific score rates. FICO score ranges between 300 and850, whereby 350-579, 580-669,670-739, 740-799, 670-800 and >800 are considered very poor, Fair, Good, Very Good and excellent/ exceptional respectively. 17%, 20.2%, 21.5%, 18.2% and 19.9% represent the percentages of people with the respective credit scores aligned above. A good Vantage Score, on the other hand, has the following credit scores. 350-549, 550-649, 650-699, 700-749, 750-850. Vantage percentage includes 16.7%, 34.1%, 18.3%, 12.6%, 30.3% while rating is very poor, poor, Fair, Good and Excellent. The United States. (2012)

There is need to come up with a comprehensive web-based application that keeps a record of customer’s ratings and credit scores including poor, fair, good or excellent. The system will be helpful to customers since they will access the credit scores and ratings at their convenience. It requires customers to register to the web application by adding personal details together with credit credentials as well as a credit card which they will use in order to access the system. the system will calculate and display the scores and rating based on parameters such as the year of acquiring first credit card, number of loan lend, expense as well as income among others.. this approach will lead to superior results as it will convenience all the stakeholders of credit information, who are lending institutions as well as customers who require loans.

Proper timeline when working on the system is appropriate. This can be well managed by subdividing the project into small parts or components and allocating each component to the specific time frame. According to (Weisman, 2013), scheduling each of the components will be easier to finish the project in phases and thereafter yield to successful completion of the whole project. In addition, working on this problem using the system will be of great benefits to customers as they can easily access what they require at any time provided they can access the system which is user-friendly.

Finally, considering the definition of deliverables according to (Kendrick, 2016), the deliverables in this project will be to provide sufficient and reliable credit scores and ratings on a web application. The project’s end results will be to ensure that consumers are in a position to know their credit scores. Another deliverable of the project is that the system will display the status of the credit scores in four categories that are poor, fair, good or excellent. The project will also deliver efficiency since it will ensure that consumers do not have to visit the company nor to the creditors for inquiries. This is because they will access any assistance they require through the web portal, thus saving time and money. Moreover, it will automate the calculation of the credit score regularly thus benefitting the company as it will save on resources and efforts. Since the software system is online based, it will be designed using PHP and HTML languages. The PHP language will be essential as it will be used in calculating the credit scores of individuals.

References

The United States. (2012). To get and keep a good credit score, pay attention to your credit report.

Weisman, S. (2013). A guide to elder planning: Everything you need to know to protect your loved ones and yourself.

Kendrick, T. (2016). How to Manage Complex Programs: High-Impact Techniques for Handling Project Workflow, Deliverables, and Teams. New York: Amacom.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Master
Top Grade Tutor
Top Essay Tutor
Accounting Homework Help
Helping Hand
ECFX Market
Writer Writer Name Offer Chat
Finance Master

ONLINE

Finance Master

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$18 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$49 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$24 Chat With Writer
Accounting Homework Help

ONLINE

Accounting Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$38 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$36 Chat With Writer
ECFX Market

ONLINE

ECFX Market

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$41 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Psy 110 university of phoenix - Bs 970 817m40 equivalent - Dap note example social work - Manual Code Review - 5590 serenity terrace pleasanton ca - Examples of confidence intervals in health care - Hsbc global connections trade forecast - Why is it important to mark the solvent front immediately - Documents required for nmc registration - Nitro reader 3 download - The disappearance of the golden toad worksheet answers - Swedish company sells personal care accessories and nutritional products - Sciencespot net scientific method crossword answers - Stat 200 week 5 homework problems - Criminal Procedure # 4 - Vce biology unit 1 and 2 practice exams - Systems understanding aid solutions 9th edition - Simpsons lord of the flies - Assume f&s offers a deal whereby - Marketers don t create needs needs preexist marketers - Crossword animals level 5 - Alberta electrical apprenticeship board - Short student council speeches - Cnss security model in information security - Ccc123 - Effective training blanchard 5th edition pdf - Aaron maldonado oregon - Justice and fairness ethics - Great expectations quote quiz - The hoist supports the kg engine - Testout routing and switching pro answers - Phet solar system simulation lab answers - Wk 2 - Apply: Challenges for Fixing Vulnerabilities - Leininger's theory of culture care diversity - Super teacher worksheets writing - Models for writers 12th edition answers - Discussion 2 - Romeo and juliet storyboard act 3 - Resurface and restore youth revealing system reviews - Here is what you need to provide: 1. What product or service are you selling - Citizens bank app error 130033 - Project management audit checklist - 3 layers of heart muscle - Consumer behavior 2nd edition kardes cronley cline - Causes of prejudice vincent n parrillo summary - Unconditional positive regard example - Replace the distributed loading by an equivalent resultant force - How do we balance a chemical equation 4 marks - Oral assessment and presentation (Interview) - Fin 534 homework set 1 - Act 1 scene 3 macbeth analysis - Assessment 4 - 3/10 homedale crescent connells point - Mean 0 and standard deviation 1 - Research project - Yeast fermentation lab balloon answers - Critical Consciousness Journal on race, ethnic identity, and racist oppressions: - Ol 125 personal development plan final submission - John hancock building structure - Desoto tools inc is planning to expand production - How manufacturing organizations use activity-based costing to increase profitability. A minimum of ten scholarly reviewed sources is required. - Nursing assignment - Strengths based leadership test - Hum 105 world mythology - Progress johan norberg pdf - Robert mcbride share price - Determination of the ka of a weak acid - Bhopal gas tragedy ethics - What does characterisation do - New hampshire technical college - Essay about concepts of health and disease and - Bald eagle excretory system - From the list of java variable names below, select the illegal variable name. - Ips e max cad crystall stains - The fall of the house of usher short story - Nursing diagnosis risk for falls as evidenced by - Steven b belkin - American optical corporation provides a variety of share based - London whale book - Little eagles nursery school - A child called it quotes with page number - Cyclohexylmethanol from grignard reagent - Kathon fp 1.5 msds - Economics assignment - Please help with questions - How many moles are in of aspartame - Pricing strategies worksheet answers - Aseptic technique and cultivation lab report - Ib chemistry data booklet - Atps to btps calculator - Coco3 soluble or insoluble - As of december 31 2017 armani company's financial - Lockwood assa abloy 334b45 - Week 9 discussion Board - Mellow mushroom thai dye pizza discontinued - Assignment - Nursing. - Accreditation standards in aged care - Sdj inc has net working - Which lightens stains better vinegar or lemon juice science project