Question

In: Computer Science

you must reference the sites that you go to ... put the link of the site...

you must reference the sites that you go to ... put the link of the site down i need like 2 website that you visited thanks you

Case Project 5-1: Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently? Who was the target? How many DoS attacks occur on a regular basis? What are some ways in which DoS attacks can be prevented? Write a one-page paper on your research.

Solutions

Expert Solution

step1# Some recently occured publicized DOS attacks are:

GitHub,Feb, 2018

  • A DDOS attack occured with 1.3 Tbps of traffic which flooded all of its servers servers with 126.9 million packets of data each second. It was one of  the biggest DDoS attack recorded in that time. It occured for about 20 mins due to the mitigation services used by the Git.

Dyn,Oct, 2016)

  • Hackers created a massive botnet incorporating IoT devices with a malware called mirai to launch. It had trickle-down effects, servers of the company Dyn’s went down , customers found their websites full of DNS errors .

BBC,Dec, 2015

  • A group of hackers called “New World Hacking” launched a 600 Gbps attack with the use of BangStresser application tool which lead the BBC’s sites, and its iPlayer on-demand service, down for about 3 hours. BBC attack used tools to launch which actually utilized cloud computing resources from two Amazon AWS servers.

The targets are mostly the best service provider of the time like cloud computing . The target is mainly to serve to extort money or disrupt the operations of a private or govt enterprise. It may be done for some personal benefits or to harm others. The researchers have discovered that there is about 28,700 dos attacks occuring perday over the internet.

step2# Some steps to prevent Ddods attacks

Use of more bandwidth

  • Make sure yyou have enough bandwidth which can handle spikes in traffic which may occur due to malicious activity.

Building redundancy in infrastructure

  • Make the infrastructure as hard as possible so that it will be difficult for an attacker to lauch the attack. Spread it in different data centers with a good load balancing system to distribute traffic between them.

Configuring network hardware against DDoS attacks

  • Configure the hardwares like  firewall or router for droping incoming ICMP packets or blocking DNS responses from outside your network. It can prevent DNS and ping-based volumetric attacks

Deployment of DDoS protection appliance.

  • There are many security vendors like Fortinet, Check Point, Cisco which offer appliances that sit in front of network firewalls and block DDoS attacks before they can take effect.

Protecting DNS server

  • Attackers can bring your server offline by Ddos attacks so it is important that your DNS servers have redundancy, and place them in different data centers behind load balancers.

Related Solutions

make sure you put the reference down the sites that you go to read information thank...
make sure you put the reference down the sites that you go to read information thank you Case Project 7-3: Comparing Cloud Computing Features As cloud computing increases in popularity, enhanced features are continually being added. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five features. What are the advantages of each? What are the disadvantages? Which would you recommend? Why? Write a one-page summary of your research.
Describe statements of "White Privilege." At the web site you will find Internet sites of individuals...
Describe statements of "White Privilege." At the web site you will find Internet sites of individuals and groups that the author Raymond A. Franklin thinks advocate violence against, separation from, defamation of, deception about, or hostility toward others based upon race, religion, ethnicity, gender or sexual orientation. Select five groups/individuals of those identified at this web site and summarize the purpose of each. http://www.hatedirectory.com/
Should go to the following link and post their comments.
  Should go to the following link and post their comments. https://www.khanacademy.org/economics-finance-domain/macroeconomics/income-and-expenditure-topic/is-lm-model-tutorial/v/loanable-funds-interpretation-of-is-curve
Go to the Bureau of Economic Analysis (Links to an external site.)Links to an external site....
Go to the Bureau of Economic Analysis (Links to an external site.)Links to an external site. (BEA) website and look at quarterly data from the last few years of the National Accounts. Can you make a decision of what part of the business cycle the U.S. economy is currently in? Why? What factors lead you to this conclusion? You may want to do additional research of sources to reach a conclusion. If so, please identify the sources that added to...
Find examples of domestic and international eCRM use on websites, videos, or reference sites such as...
Find examples of domestic and international eCRM use on websites, videos, or reference sites such as papers, and write one link.
Research two internet sites in reference to job opportunities in the Food and Beverage industry. It...
Research two internet sites in reference to job opportunities in the Food and Beverage industry. It could be in restaurants, hospitals, assisted living, cruise lines, hotels, etc... Read about the careers and opportunities. Describe the opportunities to your classmates and why you think they would or would not interest you.
Go on the link listed and write a brief summary about what you learned about McKinsey...
Go on the link listed and write a brief summary about what you learned about McKinsey and Company. http://www.mckinsey.com/about_us
Site a 5 culturally -based health practices (put a picture in column to depict it), put...
Site a 5 culturally -based health practices (put a picture in column to depict it), put a description and determine how you are going to use you personal or professional attributes in dealing with culturally -based health practices . Culture, Values, Tradition Customs. Belief, Trait Understanding Filipino Culture Delivering Health Care to the Filipino Family & to the Community Discription/ Discussion Understanding Filipino Culture Delivering Health Care to the Filipino Family & to the Community Discription/ Discussion 1 2 3...
Microeconomics B. With reference to the theories and with the use of wider research, you must...
Microeconomics B. With reference to the theories and with the use of wider research, you must complete a company report, which analyses and evaluates ONE of the 3 following companies: 1) Airbus 2) Samsung 3) Tesla You must choose ONE of the companies and follow the below structure for your report: Introduction: write a brief company profile and introduce the company’s mission and vision, strategic goals, basic financial performance in the past 3 years. Pick one of the company’s key...
1. go to www.sec.gov (Links to an external site.)Links to an external site. 2. Hover your...
1. go to www.sec.gov (Links to an external site.)Links to an external site. 2. Hover your cursor over "Filings" in the menu bar across the top 3. click on "company filings search" that pops up when you hover 4. in the FAST SEARCH box on the far right type in "AEO" for the ticker and click "search" for American Eagle. For Buckle type in "BKE". 5. in the "filings" column on the far left look for the most recent "10-K"...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT