Question

In: Computer Science

Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

Please, i need Unique answer, Use your own words (don't copy and paste).

*Please, don't use handwriting.

DDoS attack

Based on the Internet, access to the article intituled: ‘A survey on DDoS attack and defense strategies from traditional schemas to current techniques’.

1- Describe the DDoS attack.

2- Provide at least two exploited vulnerabilities used by hacker to perform the DDoS attack.

3- Provide at least two countermeasures against DDoS.

Solutions

Expert Solution

1- Describe the DDoS attack.

DDOS stands for Distributed Denial of Service. This is a security attack used by the hackers to compromise the availability of the targeted system or server. To make system or server inaccessible to others, the hacker will send high network traffic to the targeted system or server, so that it will be busy in responding to the request of the hacker and won't be able to take the legitimate request from other users. It is called distributed DOS because the malicious traffic is send from number of different system instead of one system, so that the victim is not able to identify any particular system to stop the attack.

2- Provide at least two exploited vulnerabilities used by hacker to perform the DDoS attack.

a. SYN Flood: DDOS attack using syn flood is very common. In this the hacker will send large number of TCP/SYN request to the targeted system, which will handle each packet as a new connection request. So the system will create a half open connection by sending TCP/SYN-ACK packet and wait for response from the sender. Because the sender of the connection request is malicious, so the response to complete the connection will never be received. These half open connection waiting for the response will exhaust the number of connection that can be established with the system, so it will become unreachable for other legitimate user

b. ICMP Echo Request attacks called as Smurf attack is one of the oldest method of executing DDOS attack. It is one form of reflected attack, because the malicious host sends the Echo Requests to the broadcast address of the mis-configured networks, which will force the other hosts to send Echo Reply packets to the victim system.

3- Provide at least two countermeasures against DDoS.

a. Blackhole routing

In this defense technique, all the request to the attacked system or DNS are routed to "black hole" (a non existing server or a null interface)

b. IDPS

Intrusion detection and prevention systems (IDPS) are the other defense technique to stop DDOS attack. IDPS detects the malicious request from the hacker and take appropriate measure to stop the security attack. For eg. If it analyze that huge no of connection request are coming from a particular network, the the connection is never established completely, the IDPS will drop all the request from the particular network for some time to stop the attack.


Related Solutions

Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. *Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting. _______________ Solve the following questions Q1 Construct a cumulative frequency distribution of the 20 brain volumes(cm3) listed below. Use the classes 900-999, 1000-1099,...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. *Please, don't use handwriting.* *Please, don't use handwriting. *Please, don't use handwriting.**Please, don't use handwriting. *Please, don't use handwriting.**Please, don't use handwriting. *Please, don't use handwriting.* * i need References URL Link pleasssse help me i need the answer Critically appraise the following cross-sectional study given in the link below: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5989365/ Discuss the strength and limitations of the study in a brief manner...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 2. In present scenario, the importance of microeconomics is increasing day by day, in your          Opinion, what are the three ways that we can use macroeconomic analysis.
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 3. When the whole sector of the market is occupied by the little number of big corporations who share the leadership, what do we call this type of market structure? Explain in details the benefits for the leading company and disadvantage of such situation on final consumers.
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Suppose you are assigned a task of designing user interface for a web application to get students' feedback about sports facilities provided at the campus. The application is composed of data entry forms with menus and dialog boxes. Having, as goals, speeding up students’ data entry and reducing errors, please tell which six major menu design concerns you will keep in mind during...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q1. Discuss in your words the purpose of a bank reconciliation. (1 point) Q2. Prepare general journal entries for the following transactions of this company for the current year: (2 points). Apr. 25 Sold SAR 4,500 of merchandise to CBC Corp., receiving a 10%, 60-day, SAR 4,500 note receivable. June 24 The note of CBC Corp., received on April 25...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard.    Q3. Choose two accounting assumptions and explain in your word.   
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 1. Provide an example of any two leading companies from the same industry, which are competing directly for market share. Give a short profile. Q. 2. Suppose, if you are the manager of one of these companies, what pricing policy will you adopt to be in the first position? Why? Q. 3. When the whole sector of the market...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Q1: Assume that there is a class named TestInterface that implements two interfaces A and B. Both the interfaces have a common method with the same signature (example int sampleMethod()). Explain how will the class define this method and how will the compiler identify, to which...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Complete the following table related to the CIA triad. Confidentiality Integrity Availability Definition Example of business situation leading to a loss of Example of threat to
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT