Question

In: Computer Science

Digital Forensics, At least 200 words for each question 1/ Research a network attack (DDoS, Man-in-the-Middle,...

Digital Forensics, At least 200 words for each question

1/ Research a network attack (DDoS, Man-in-the-Middle, IP Spoofing, etc.) and explain it in further detail.

2/ Discuss ways that forensic examiners have been able to identify and analyze these attacks.

3/ Find an attack , where an examiner was able to successfully identify the attacker, and explain techniques used to do so.

Solutions

Expert Solution

Distributed Denial of Service:

A Distributed Denial of Service attack is considered as one of the most powerful weapons presents over the internet. The common phenomenon of this attack is that bringing the application or website down by the hackers. It basically relevant to that the victim is being attacked by the Distributed Denial of Service. In short this actually means the hacker attempted to bring down the website by flooding the website with traffics and thus results into the website crash. The Distributed Denial of Service attack mainly targets the websites and online services or applications. The main objective of the attacker is to overwhelm the website with traffic which the server is unable to handle or the network bandwidth can able to accommodate, thus making the website unable to operate. The traffic mainly consists of the incoming messages, connection requests and fake packets. In most of the cases, the targeted victims are mostly threatened with the Distributed Denial of Service attack or even attacked at a very low level. This might be combined with the extortion threat or can be quite devastating unless the victims pays a ransom to the attacker. The Distributed Denial of Service attack is quite dangerous for the victim.

Ways that forensic examiners have been able to identify and analyze these attacks

The main purpose of the computer forensic examination is to recover the data from the computers seized as the evidence in the criminal investigation especially when the victim is targeted with the network attacks such as Distributed Denial of Service, main in the middle attack, ransomware, etc. The forensic experts mainly utilize the systematic approach which can examine the evidence that could help the experts to find the attacker and even can helps in figuring the loophole present in the infrastructure. Most of the forensic examiners perform their test on the data set, such as looking for the data which are compromised. They make use of the forensic tool which basically helped them to determine and gather the evidence from the attack. Moreover, the forensic examiners uses forensic tools such as Wireshark which helps in gathering the traffic information that entered or went out of the victim’s network. Wireshark mostly capture the packet and then analyze it. The network forensic tool mostly helped the forensic experts to come to a conclusion regarding the time of attack and the loophole present in the victim’s network.

Technique used to identify the attacker:

Figuring out the exact location of the attacker from where the attack is being triggered is very much difficult as the attacker mostly use different location to trigger the attack and thus makes it difficult for any forensic examiner to detect the exact IP address of the attacker’s system. But in few cases though the forensic examiner got success in finding out the details of the attacker. One such incident where forensic expert got hold of a 18 year old attacker who tried to launch a Distributed Denial of Service attack on the Dutch Tax authority by bringing down their servers using loads of traffic. The forensic experts most use certain technology to figure out the location and even many businesses use a trap to divert the attack from the actual server to the trap. Honeypot is one such technique which uses the network attached system just to set up a decoy to lure down the cyber attackers and can able to detect, study and deflect the hacking attempt from the main infrastructure to the decoy one. The honey pot usually act as loophole present in the network security and the OS are configured such that attacker think it’s a exploitable vulnerability.


Related Solutions

Digital Forensics, Describe in your own language, at least 200 words for each question 1/Explain the...
Digital Forensics, Describe in your own language, at least 200 words for each question 1/Explain the Fourth Amendment and its impact on Digital Forensics 2/Define the Electronic Communication Privacy Act 3/Describe email protocols.
Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 300 words...
Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 300 words or more describing the case and the how digital forensics were used in the investigation. Please write in own words
Digital Forensics, at least 250 words Chapter 5 goes into great detail about Windows systems, however,...
Digital Forensics, at least 250 words Chapter 5 goes into great detail about Windows systems, however, other systems, such as Mac, Linux exist. Search for one other system not mentioned in your book and describe their artifacts and their functionalities. How they might be used by forensic examiners? Be sure to list your sources.
Digital Forensics 1. Many anti-forensic techniques also have purposes which are not for anti-forensics. For each...
Digital Forensics 1. Many anti-forensic techniques also have purposes which are not for anti-forensics. For each of the following, describe the technique and what would be required to show there was intent to destroy or hide evidence. a. Encryption b. Defragmentation c. Drive Wiping
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link...
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link in any security implementation? Why? 3. Define the method and purpose of social engineering.
Please use at least 200 words to describe each of the following questions: To minimize the...
Please use at least 200 words to describe each of the following questions: To minimize the uncertainty in a new instrument for measuring distance, would it be better to calibrate the new instrument with the PDT or the Ultra-sonic Sensor? Also, if possible, discuss how to use the value of the range, total uncertainties, and full-scale error of PDT and The Ultra-Sonic Sensor to select a sensor for a specific application
Read the discussion question posted below, then post a comment of at least 200 words. How...
Read the discussion question posted below, then post a comment of at least 200 words. How are the simple rate, the periodic rate, and the effective annual rate related? Can you think of a situation where all three of these rates will be the same?
Each analsis should has at least 200 words. analyze 1. Explain “raw materials inventory” and provide...
Each analsis should has at least 200 words. analyze 1. Explain “raw materials inventory” and provide a real life example from three different maunfacturing companies. analyze 2.Explain the job order cost system. choose 2 additional different manufacturing companies that use the job order cost system. Explain why it benefits these 2 manufacturing companies to use this cost system for their type of inventory.
Answer the following questions at least in 200 words each. Please do NOT copy and paste...
Answer the following questions at least in 200 words each. Please do NOT copy and paste from another source (Looking for answers not plagiarism). Please include any sources which were used. 1- According to Socrates, what is the value of justice? Why should we go to the trouble of being just? Is this discussion of justice still relevant today? How it affects economics? 2- Socrates believed that the "ideal city" should be comprised of three classes. What are these classes,...
explore the digital marketing strategies of any company of at least 600 words 1. Introduction of...
explore the digital marketing strategies of any company of at least 600 words 1. Introduction of company 2. A brief history of the company 3.      With examples explain how the company uses Internet tools (e.g. website, blog, social media, mobile apps, banners ads, content marketing, search marketing) to appeal to its customers. 4.      Give your evaluation of companies’ activities with suggestions.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT