Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ddos attacks evolution detection prevention reaction and tolerance

22/10/2021 Client: muhammad11 Deadline: 2 Day

Problem Statement- Identification And Prevention Of DDoS Attacks

Problem statement- Identification and prevention of DDoS Attacks

DoS attack prevents legitimate users from accessing the required resources from a network such as a website and computer systems. The attack occurs when a malicious user tries to consume all resources available to server hence blocking all services that legitimate users would like to access. The attack apart from consuming bandwidth, it also in some occasions consumes file space, memory as well as CPU. The server is overwhelmed by overloaded traffic making it unable to respond to the legitimate users till countermeasures are taken. On the other hand, Distributed Denial of Service attack is launched indirectly through compromised computing systems that facilitate coordinated attack on network or system. A Distributed Denial of Service (DDoS) can be considered to be a subset of a Denial of Service (DoS) and arises due to various principles of the internet which include resource sharing and accessibility. The DDoS attack, for instance, overwhelms web servers by consistently sending it data beyond its handling capabilities This attack attempts to disrupt the targeted system using the internet principles thus overwhelming legitimate users by denying them access to the system resources. The hacker ensures that there is a production of more traffic than the victim is in a position to handle by accumulating as many computers as possible thus the origin of the Distributed attack. There is need to identify these attacks, manage them as well as prevent them and look into ways of differentiating between malicious and legitimate users as it is a common persistent problem faced up to date.

DDoS attack network is of two types, the Agent- Handler model as well as Internet Relay Chat model. The former type comprises of clients where the attacker makes communication with other DDoS attack system, agents software which exists in the comprised system which is to carry the attack and handlers, which are located throughout the network where agent and clients communicate. The attacker usually communicates with handlers so as to identify the running agents, when the attacks should be scheduled and the best time to upgrade the agents. Internet Relay chat model, however, connect clients to agents via a form of communication instead of using a handler. DDoS attacks can be divided into two classes, that is, resource depletion attacks and bandwidth depletion attacks. Bandwidth depletion is projected to prevent legitimate users access primary resources by flooding uncontrolled traffic to the network while resource depletion is designed in a way that it ties up victim’s resources, hindering the network from accessing the legitimate users. The DDoS attack can easily consume computing resources without prior notice and within a very short period of time (Shannon, 2015). According to recent studies, DDoS attacks are likely to attack a network resource and majorly results from internet’s inability to manage bandwidth consumption attacks. In addition, they are likely to occur when hosts can send and receive resources from each other. The DDoS attack is regarded to be simple attacks since their installation is not complicated and are capable of compromising a server very fast and forestall users from accessing it. Subsequently, difficulties in designing effective control measures due to the indistinguishable nature of normal traffic and attacks. Past researchers show that the best way to manage the DDoS attack is by using preventive techniques as well as avoidance techniques, (Bhattacharyya & Kalita, 2016). In order to defend against DDoS attack, researchers have mostly focused on analytical studies. It is clear from the current DDoS attack around the world that these attacks are outgrowing based on the scale of attacks and sophistication level too. while the attacks targeting medium-sized firms peak at around 50 Gbps, large sized enterprises attacks are in a position to peak to 300 Gbps, for instance, the April 2013 largest historical DDoS attack that peaked at 300 Gbps slowing down internet worldwide. Therefore DDoS attack is major issues affecting the security of both public and private networks.

The approach to solving the networks and computers from being attacked is applying preventive measures and by using network simulation which simulates server system and network performance. DDoS can be prevented by configuring routers at the network layer when possible. In addition, administrative techniques can be used when configuring the routers is inappropriate. Another way of solving this problem is by blocking internet attacks from websites and can be done in various ways including blocking attacks with packet filers on a router. This is necessary when a close examination of attacks has been done. Likewise, the attacks can be blocked by configuring the firewalls. Considering a simple communication model established in this project, packet filtering is an effective way to block the DDoS attack as ingress filtering and egress filtering would be effective. Ingress filtering technique is used to ensure that incoming packets are free of manipulated IP address sources in their headers so that the computer is unable to trace the source of the attack. Incoming packets are usually filtered based on the prior information regarding unauthorized sending of packets to specific IP address. The idea based on ingress filtering is to prevent computer in the network from acting as another computer. Although this is the best way of solving the attack on the small network, it is rarely used by ISPs since filtering degrades the ISP network performance significantly. In addition, in ISP, filtering does not eliminate the DDoS attack but reduces spoofing. Despite this, it is an effective way considering the small-sized framework and has superseded the traditional old styles.

The approach outlined above will be sufficient in blocking attacks from computers and networks. using network simulation it is possible to design and produce safe, reliable, fast and cost-effective results unlike the traditional ways of focusing on analytical studies. an algorithm to categorize clients who send the attacks with the help of a database is possible in network simulation. The database categorizes the clients based on whether they are registered or not. Unregistered clients are blocked for a while until the completion of the peak season and are later unblocked and a response sent to them. In case of a registered client, they are provided with responses whether it is during the peak season or not or not using two types of methodologies, that is, access count and Warning count. This methodology prohibits access of non-registered users as well as to unregistered users who send multiple requests.

The DDoS attacks need faster control since they do not have a prior notice thus timing and scheduling of the action items is so essential. Sometimes a website may become inaccessible to many users leading to overloading of the server caused by maximum utilization resulting in severe performance and slow processing time, (Shannon, 2017). The DDoS attacks are sophisticated and eventually lead to catastrophic service failure. The attacks involve sending packets to the victims in high quantities such that vital resources in the network, memory and CPU time are exhausted. Eventually, the victim crashes or spends much of its time handling them and eventually fails to attend to its real work.

The aggressiveness to having the required mitigation skills to counter-attack DDoS attacks is an essential thing. Skills related to networking and application layers in the OSI model is a key thing given that attacks often occur around this areas. System administration skills are also vital by the virtue that they are covered in the web infrastructure.

There are many benefits of completing a project other than the satisfaction experienced by individuals and teams involved in the project. It is however of more benefits when the project concludes at the required time and within the budget confines. Project completion means that the desired results have been met and that project customers and shareholders benefit since they can access the resources without the interruptions of the attacks

Deliverable, defined as tangible or intangible results are the effective output of this project simulation. for instance, in a case where no attackers are placed in a network and two users are sending packets at a varying time, the incoming packets get served quickly hence active TCP connection counts. In a case where the huge amount of attack traffic occurs on the targeted server, the server is unable to handle the request demand and becomes overwhelmed since the server's resources are completely employed reducing memory size to 0 bytes. Blocking the attacks minutes into the DDoS attack lowers active TCP connection counts at the server and hence the network starts to recover faster. After the attack, however, CPU utilization of the server remains high for a given period of time due to the huge traffic waiting to be processed by the CPU and it generally has to take some time to drain the fully overwhelmed server. Thereafter, when the necessary mitigating approaches are taken, the server resumes its resources and is accessible by legitimate users. The simulation project can be characterized by the following vulnerabilities; one is distributed defense rather than a centralized defense of the DDoS attacks due to the high volume and rate of attack packets. Secondly, ensuring less collateral damage is a prime deliverable in this project, therefore, guarantying High Normal Packet Survival Ratio will be necessary. Third, the project will ensure confidentiality, secure exchange of information between defense nodes as well as the credibility of sources by ascertaining provision of secure information for controlled messages. Moreover, the project will successfully deliver a defense model which does not require centralized control. Lastly, the defensive project will take into account future characteristic issues like interfering with other systems. The above-advanced mitigation techniques or deliverables are expected at the end of the project since they protect the network system and computers from DDoS attacks.

References

Shannon, M. (2015). IINS: DDoS Attacks.

Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS attacks: Evolution, detection, prevention, reaction, and tolerance

Shannon, M. (2017). Security+: DoS and DDoS Attacks.

Problem Statement-Analyzing financial status using credit Score Rating

Financial institutions use credit scores of the consumers as a basis for issuing them loans and may have poor, fair, good or excellent credit scores and rating. Credit scores matters since it helps lenders anticipate on the likelihood of lending an individual a loan at any time. They are as well referred to as risk scores because they assist financial lenders to assess the risk of a customer failing to pay the issued debts or loans. The main problem experienced in financial analysis on basis of credit scores and rating is that customers are not in a position to realize there credit scores as the information is only available to the lenders or financial situation.

A credit score of 700 and above is considered generally good, while that of 800 and above is taken to be excellent but most of customer credit scores lie between 600 and 750. According to past research, there are two main types of credit scores including FICO Scores and Vantage Score although there exist industry-specific score rates. FICO score ranges between 300 and850, whereby 350-579, 580-669,670-739, 740-799, 670-800 and >800 are considered very poor, Fair, Good, Very Good and excellent/ exceptional respectively. 17%, 20.2%, 21.5%, 18.2% and 19.9% represent the percentages of people with the respective credit scores aligned above. A good Vantage Score, on the other hand, has the following credit scores. 350-549, 550-649, 650-699, 700-749, 750-850. Vantage percentage includes 16.7%, 34.1%, 18.3%, 12.6%, 30.3% while rating is very poor, poor, Fair, Good and Excellent. The United States. (2012)

There is need to come up with a comprehensive web-based application that keeps a record of customer’s ratings and credit scores including poor, fair, good or excellent. The system will be helpful to customers since they will access the credit scores and ratings at their convenience. It requires customers to register to the web application by adding personal details together with credit credentials as well as a credit card which they will use in order to access the system. the system will calculate and display the scores and rating based on parameters such as the year of acquiring first credit card, number of loan lend, expense as well as income among others.. this approach will lead to superior results as it will convenience all the stakeholders of credit information, who are lending institutions as well as customers who require loans.

Proper timeline when working on the system is appropriate. This can be well managed by subdividing the project into small parts or components and allocating each component to the specific time frame. According to (Weisman, 2013), scheduling each of the components will be easier to finish the project in phases and thereafter yield to successful completion of the whole project. In addition, working on this problem using the system will be of great benefits to customers as they can easily access what they require at any time provided they can access the system which is user-friendly.

Finally, considering the definition of deliverables according to (Kendrick, 2016), the deliverables in this project will be to provide sufficient and reliable credit scores and ratings on a web application. The project’s end results will be to ensure that consumers are in a position to know their credit scores. Another deliverable of the project is that the system will display the status of the credit scores in four categories that are poor, fair, good or excellent. The project will also deliver efficiency since it will ensure that consumers do not have to visit the company nor to the creditors for inquiries. This is because they will access any assistance they require through the web portal, thus saving time and money. Moreover, it will automate the calculation of the credit score regularly thus benefitting the company as it will save on resources and efforts. Since the software system is online based, it will be designed using PHP and HTML languages. The PHP language will be essential as it will be used in calculating the credit scores of individuals.

References

The United States. (2012). To get and keep a good credit score, pay attention to your credit report.

Weisman, S. (2013). A guide to elder planning: Everything you need to know to protect your loved ones and yourself.

Kendrick, T. (2016). How to Manage Complex Programs: High-Impact Techniques for Handling Project Workflow, Deliverables, and Teams. New York: Amacom.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Master
Top Grade Tutor
Top Essay Tutor
Accounting Homework Help
Helping Hand
ECFX Market
Writer Writer Name Offer Chat
Finance Master

ONLINE

Finance Master

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$18 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$49 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$24 Chat With Writer
Accounting Homework Help

ONLINE

Accounting Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$38 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$36 Chat With Writer
ECFX Market

ONLINE

ECFX Market

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$41 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to run independent sample t test in spss - Human Resource management: Final Project Milestone Three Guidelines and Rubric - 0.256 as a fraction - Ac current amplifier circuit - Christopher parrish vsim - Assignment - Library Assignment / Case Scenario - Indicators of air pollution ppt - One of the fundamental questions asked by virtue ethicists is - Religion and Technology - Kn m to psi - Devil cut haircut fade - Broad bean diseases australia - Saskia sassen global cities and survival circuits - Finance equations & answers pdf - Introduction to Psychology - How to use gibbs reflective cycle in an essay - Cube root of 218 - National geographic big bigger biggest dam - Dirks v.sec - Information governance - Cessna 172 max crosswind - Service dominant logic apple - When is behaviorism beneficial for learners - Scheriproct ointment bayer plc - 555 california tree lighting - Villanova master black belt program - What are the genotypes of these flies - Hewlett Packard (HP) - 2 coments each one 150 words (CITATION AND REFERENCE) - Http www strategicbusinessinsights com vals surveynew shtml - Short Paper - Properties of quadrilaterals answer key - Designing embedded systems with pic microcontrollers 3rd edition - Ch3i polar or nonpolar - Bath and body works supply chain - Speeds test for shoulder - Advantages of product standardization - Dragon systems goldman sachs - 6 step sales process - 0.48 repeating as a fraction - Ramesh babu barber net worth - Aes uses a feistel structure - A6 paper size in cm - Quote unquote leeds beckett - Loeb drama center view from my seat - Cloud computing - Discussion: Cognitive Behavioral Therapy: Group Settings Versus Family Settings - Assignment 9/22/2020 - Which of the following people is incorrectly matched with his/her environmental contribution? - Identification of an unknown carbonate by titration - Chapter 1 introduction to statistics 1.2 exercises answers - Hgt - Aeg circuit breaker distributors - A midsummer night's dream plot - Norse and greek gods comparison chart - Strong words softly spoken - Something borrowed malcolm gladwell - The atomic weight density and atomic radius for three - Consumer behavior (study case) - Seidler v luna park reserve trust - 300 word imclone criminal case - Human resource management discussion questions - Teddy roosevelt abercrombie and fitch - Which statement decribes megalithic architecture - Circumference and area of a circle khan academy - Jane elliott change of habit - Pamela painter the new year - Rock climbing powerpoint presentation - Electrical certificate of verification - Moral and ethical issues of enclave tourism - Battery room lighting requirements - Clipsal dimmable led downlights - Bec caruana dance all night - John and andrew doney invented a hard bearing - 300 words discussion - Paper - What Challenges Did The Health Care Industry Face When You Entered The Program? - Comparison of ethical theories - Crow lake by mary lawson summary - Girls and Gangs - How do things move - Thank you letter after mock interview - Mother in hebrew transliteration - Middle passage robert hayden analysis - Assignment assistance - Ethics and Diversity - Edwin lemert described primary deviance as - What is contemporary culture - A sole proprietorship ________ - Assignment - What is a highwayman - Research Methods in Criminal Justice – Chapter 12 Questions. - Myitlab excel chapter 5 homework - Edrolo free practice exams - Social,Ethical & Legal Discussion & Reflection - Week 14 - Essay about designing rational Agents for (Artificial intelligence) course - Needed Urgently, Accounting homework - Possible conflict management and negotiation techniques - Longitude and latitude of new york