Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ddos attacks evolution detection prevention reaction and tolerance

22/10/2021 Client: muhammad11 Deadline: 2 Day

Problem Statement- Identification And Prevention Of DDoS Attacks

Problem statement- Identification and prevention of DDoS Attacks

DoS attack prevents legitimate users from accessing the required resources from a network such as a website and computer systems. The attack occurs when a malicious user tries to consume all resources available to server hence blocking all services that legitimate users would like to access. The attack apart from consuming bandwidth, it also in some occasions consumes file space, memory as well as CPU. The server is overwhelmed by overloaded traffic making it unable to respond to the legitimate users till countermeasures are taken. On the other hand, Distributed Denial of Service attack is launched indirectly through compromised computing systems that facilitate coordinated attack on network or system. A Distributed Denial of Service (DDoS) can be considered to be a subset of a Denial of Service (DoS) and arises due to various principles of the internet which include resource sharing and accessibility. The DDoS attack, for instance, overwhelms web servers by consistently sending it data beyond its handling capabilities This attack attempts to disrupt the targeted system using the internet principles thus overwhelming legitimate users by denying them access to the system resources. The hacker ensures that there is a production of more traffic than the victim is in a position to handle by accumulating as many computers as possible thus the origin of the Distributed attack. There is need to identify these attacks, manage them as well as prevent them and look into ways of differentiating between malicious and legitimate users as it is a common persistent problem faced up to date.

DDoS attack network is of two types, the Agent- Handler model as well as Internet Relay Chat model. The former type comprises of clients where the attacker makes communication with other DDoS attack system, agents software which exists in the comprised system which is to carry the attack and handlers, which are located throughout the network where agent and clients communicate. The attacker usually communicates with handlers so as to identify the running agents, when the attacks should be scheduled and the best time to upgrade the agents. Internet Relay chat model, however, connect clients to agents via a form of communication instead of using a handler. DDoS attacks can be divided into two classes, that is, resource depletion attacks and bandwidth depletion attacks. Bandwidth depletion is projected to prevent legitimate users access primary resources by flooding uncontrolled traffic to the network while resource depletion is designed in a way that it ties up victim’s resources, hindering the network from accessing the legitimate users. The DDoS attack can easily consume computing resources without prior notice and within a very short period of time (Shannon, 2015). According to recent studies, DDoS attacks are likely to attack a network resource and majorly results from internet’s inability to manage bandwidth consumption attacks. In addition, they are likely to occur when hosts can send and receive resources from each other. The DDoS attack is regarded to be simple attacks since their installation is not complicated and are capable of compromising a server very fast and forestall users from accessing it. Subsequently, difficulties in designing effective control measures due to the indistinguishable nature of normal traffic and attacks. Past researchers show that the best way to manage the DDoS attack is by using preventive techniques as well as avoidance techniques, (Bhattacharyya & Kalita, 2016). In order to defend against DDoS attack, researchers have mostly focused on analytical studies. It is clear from the current DDoS attack around the world that these attacks are outgrowing based on the scale of attacks and sophistication level too. while the attacks targeting medium-sized firms peak at around 50 Gbps, large sized enterprises attacks are in a position to peak to 300 Gbps, for instance, the April 2013 largest historical DDoS attack that peaked at 300 Gbps slowing down internet worldwide. Therefore DDoS attack is major issues affecting the security of both public and private networks.

The approach to solving the networks and computers from being attacked is applying preventive measures and by using network simulation which simulates server system and network performance. DDoS can be prevented by configuring routers at the network layer when possible. In addition, administrative techniques can be used when configuring the routers is inappropriate. Another way of solving this problem is by blocking internet attacks from websites and can be done in various ways including blocking attacks with packet filers on a router. This is necessary when a close examination of attacks has been done. Likewise, the attacks can be blocked by configuring the firewalls. Considering a simple communication model established in this project, packet filtering is an effective way to block the DDoS attack as ingress filtering and egress filtering would be effective. Ingress filtering technique is used to ensure that incoming packets are free of manipulated IP address sources in their headers so that the computer is unable to trace the source of the attack. Incoming packets are usually filtered based on the prior information regarding unauthorized sending of packets to specific IP address. The idea based on ingress filtering is to prevent computer in the network from acting as another computer. Although this is the best way of solving the attack on the small network, it is rarely used by ISPs since filtering degrades the ISP network performance significantly. In addition, in ISP, filtering does not eliminate the DDoS attack but reduces spoofing. Despite this, it is an effective way considering the small-sized framework and has superseded the traditional old styles.

The approach outlined above will be sufficient in blocking attacks from computers and networks. using network simulation it is possible to design and produce safe, reliable, fast and cost-effective results unlike the traditional ways of focusing on analytical studies. an algorithm to categorize clients who send the attacks with the help of a database is possible in network simulation. The database categorizes the clients based on whether they are registered or not. Unregistered clients are blocked for a while until the completion of the peak season and are later unblocked and a response sent to them. In case of a registered client, they are provided with responses whether it is during the peak season or not or not using two types of methodologies, that is, access count and Warning count. This methodology prohibits access of non-registered users as well as to unregistered users who send multiple requests.

The DDoS attacks need faster control since they do not have a prior notice thus timing and scheduling of the action items is so essential. Sometimes a website may become inaccessible to many users leading to overloading of the server caused by maximum utilization resulting in severe performance and slow processing time, (Shannon, 2017). The DDoS attacks are sophisticated and eventually lead to catastrophic service failure. The attacks involve sending packets to the victims in high quantities such that vital resources in the network, memory and CPU time are exhausted. Eventually, the victim crashes or spends much of its time handling them and eventually fails to attend to its real work.

The aggressiveness to having the required mitigation skills to counter-attack DDoS attacks is an essential thing. Skills related to networking and application layers in the OSI model is a key thing given that attacks often occur around this areas. System administration skills are also vital by the virtue that they are covered in the web infrastructure.

There are many benefits of completing a project other than the satisfaction experienced by individuals and teams involved in the project. It is however of more benefits when the project concludes at the required time and within the budget confines. Project completion means that the desired results have been met and that project customers and shareholders benefit since they can access the resources without the interruptions of the attacks

Deliverable, defined as tangible or intangible results are the effective output of this project simulation. for instance, in a case where no attackers are placed in a network and two users are sending packets at a varying time, the incoming packets get served quickly hence active TCP connection counts. In a case where the huge amount of attack traffic occurs on the targeted server, the server is unable to handle the request demand and becomes overwhelmed since the server's resources are completely employed reducing memory size to 0 bytes. Blocking the attacks minutes into the DDoS attack lowers active TCP connection counts at the server and hence the network starts to recover faster. After the attack, however, CPU utilization of the server remains high for a given period of time due to the huge traffic waiting to be processed by the CPU and it generally has to take some time to drain the fully overwhelmed server. Thereafter, when the necessary mitigating approaches are taken, the server resumes its resources and is accessible by legitimate users. The simulation project can be characterized by the following vulnerabilities; one is distributed defense rather than a centralized defense of the DDoS attacks due to the high volume and rate of attack packets. Secondly, ensuring less collateral damage is a prime deliverable in this project, therefore, guarantying High Normal Packet Survival Ratio will be necessary. Third, the project will ensure confidentiality, secure exchange of information between defense nodes as well as the credibility of sources by ascertaining provision of secure information for controlled messages. Moreover, the project will successfully deliver a defense model which does not require centralized control. Lastly, the defensive project will take into account future characteristic issues like interfering with other systems. The above-advanced mitigation techniques or deliverables are expected at the end of the project since they protect the network system and computers from DDoS attacks.

References

Shannon, M. (2015). IINS: DDoS Attacks.

Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS attacks: Evolution, detection, prevention, reaction, and tolerance

Shannon, M. (2017). Security+: DoS and DDoS Attacks.

Problem Statement-Analyzing financial status using credit Score Rating

Financial institutions use credit scores of the consumers as a basis for issuing them loans and may have poor, fair, good or excellent credit scores and rating. Credit scores matters since it helps lenders anticipate on the likelihood of lending an individual a loan at any time. They are as well referred to as risk scores because they assist financial lenders to assess the risk of a customer failing to pay the issued debts or loans. The main problem experienced in financial analysis on basis of credit scores and rating is that customers are not in a position to realize there credit scores as the information is only available to the lenders or financial situation.

A credit score of 700 and above is considered generally good, while that of 800 and above is taken to be excellent but most of customer credit scores lie between 600 and 750. According to past research, there are two main types of credit scores including FICO Scores and Vantage Score although there exist industry-specific score rates. FICO score ranges between 300 and850, whereby 350-579, 580-669,670-739, 740-799, 670-800 and >800 are considered very poor, Fair, Good, Very Good and excellent/ exceptional respectively. 17%, 20.2%, 21.5%, 18.2% and 19.9% represent the percentages of people with the respective credit scores aligned above. A good Vantage Score, on the other hand, has the following credit scores. 350-549, 550-649, 650-699, 700-749, 750-850. Vantage percentage includes 16.7%, 34.1%, 18.3%, 12.6%, 30.3% while rating is very poor, poor, Fair, Good and Excellent. The United States. (2012)

There is need to come up with a comprehensive web-based application that keeps a record of customer’s ratings and credit scores including poor, fair, good or excellent. The system will be helpful to customers since they will access the credit scores and ratings at their convenience. It requires customers to register to the web application by adding personal details together with credit credentials as well as a credit card which they will use in order to access the system. the system will calculate and display the scores and rating based on parameters such as the year of acquiring first credit card, number of loan lend, expense as well as income among others.. this approach will lead to superior results as it will convenience all the stakeholders of credit information, who are lending institutions as well as customers who require loans.

Proper timeline when working on the system is appropriate. This can be well managed by subdividing the project into small parts or components and allocating each component to the specific time frame. According to (Weisman, 2013), scheduling each of the components will be easier to finish the project in phases and thereafter yield to successful completion of the whole project. In addition, working on this problem using the system will be of great benefits to customers as they can easily access what they require at any time provided they can access the system which is user-friendly.

Finally, considering the definition of deliverables according to (Kendrick, 2016), the deliverables in this project will be to provide sufficient and reliable credit scores and ratings on a web application. The project’s end results will be to ensure that consumers are in a position to know their credit scores. Another deliverable of the project is that the system will display the status of the credit scores in four categories that are poor, fair, good or excellent. The project will also deliver efficiency since it will ensure that consumers do not have to visit the company nor to the creditors for inquiries. This is because they will access any assistance they require through the web portal, thus saving time and money. Moreover, it will automate the calculation of the credit score regularly thus benefitting the company as it will save on resources and efforts. Since the software system is online based, it will be designed using PHP and HTML languages. The PHP language will be essential as it will be used in calculating the credit scores of individuals.

References

The United States. (2012). To get and keep a good credit score, pay attention to your credit report.

Weisman, S. (2013). A guide to elder planning: Everything you need to know to protect your loved ones and yourself.

Kendrick, T. (2016). How to Manage Complex Programs: High-Impact Techniques for Handling Project Workflow, Deliverables, and Teams. New York: Amacom.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Master
Top Grade Tutor
Top Essay Tutor
Accounting Homework Help
Helping Hand
ECFX Market
Writer Writer Name Offer Chat
Finance Master

ONLINE

Finance Master

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$18 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$49 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$24 Chat With Writer
Accounting Homework Help

ONLINE

Accounting Homework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$38 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$36 Chat With Writer
ECFX Market

ONLINE

ECFX Market

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$41 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Shareholder analysis - Wave on a string simulation worksheet answers - 5 moist heat cooking methods - Molecular phylogenies show all land plants are a monophyletic group. this suggests ________. - Whole foods market case study analysis - Right boss wrong company case study - Mother and daughter jewelers breaches its lease - Graded assignment - Economic - Lord bernstein v skyviews and general ltd [1978] q.b. 479 - Ibm sterling b2b integrator - Pacific datacom fortitude valley - American express investor day presentation 2019 - Essay - Walker texas ranger full episodes youtube in english - Disscussion - Persistent http without pipelining - Www courts sa gov au case list - Swot analysis disney parks and resorts - The party line rachel rafelman - English sba written report sample - Cmgt 400 risky situations - Lexi in the vampire diaries - Essay - What is air pressure measured in - A nonequity strategic alliance exists when - Engaging Students in the Social Studies Classroom - What are intertidal zones - Speech about inspirational person - Rageh omaar ottoman documentary - Bni referral slip education - Nursing Discussion - Bsbwor203b answers - I need 1800 words in Construct the fault tree consist of AND and OR gates - Urban outfitters mission and vision statement - A birthday present sylvia plath analysis - New macdonald's farm max's tractor - Intermediate Accounting - Citrix edgesight installation guide - Problem Statement/ Research Questions - 01.10 macbeth the power of words - Planning and the marketing mix simulation - Public personal clouds - 2 year old child observation report - Order 2436104: Student Code of Conduct - Organizational Analysis - Multisim agilent oscilloscope - Ni 488.2 windows compatibility - Does big data bring big rewards - Acc 202 final project presentation to investors chegg - Findmyip org - Discussion: Devotional Reflection-Integrity - Limit laws of sequences - Stores material within the cell - Biology ltf diagnostic test evolution and taxonomy answers - Triton xt2ahb 18v battery - Advantages of net present value method - Legal Environment ESSAY - Pvc - Grim-visaged war hath smoothed his wrinkled front - Istikhara transliteration and translation - 2 resistors in series - How to start a genogram - Depth comparison in computer graphics - Reading comprehension for grade 10 with questions and answers pdf - Why henry viii break with rome - Beet rosti with rosemary - A commercial refrigerator with r as the working fluid - Digging up the past tbc - Jeff bliss duncanville today - EssayGTheMan - Psychoanalysis was a therapy technique designed by - St john of god subiaco admissions - The farm life inside angola prison summary - Clinic 16 royal north shore - Wjec latin vocab tester - Http mpsweb intranet mps - Incident at vichy script pdf - Theory and practice of group counseling 9th edition apa citation - Merlin entertainments mission statement - What milestones is starbucks known for - Discusson - Self-Care - Tod's pie factory shark tank - Why did kathy experience the altered sensation - Melting ice experiment worksheet - Zappos mobile commerce - Self referral physio worthing hospital - Why is a volumetric flask used in titration - Fst 7 bodybuilding com - Poems about violence and crime - The salesperson's task of identifying potential customers is known as - White supremacy, Racism and Racial Formations - Initiating the Project - Problem Set 8 - Written presentation - Foreshadowing in the cask of amontillado - Balance sheet hedge translation exposure - Case parts emporium - Employment management system project source code - Computer history assignments