Question

In: Computer Science

Find an article regarding a network problem that occurred in the past 6 to 8 months....

Find an article regarding a network problem that occurred in the past 6 to 8 months. Be sure to pick an article that reports on a problem that relates back to a topic covered in class. The problem could be related to security, design, redundancy, etc. (Top Down Network Design)

Choose your article wisely! If you cannot respond to the requirements of the assignment then choose a different article or find supporting articles that will help.

The article cannot be about Heartbleed, Target, Sony or Yahoo!

Imagine that you are a network administrator working for the company in question. Write a one page memo to your manager about the problem and how to prevent it.

Your memo should include the following information:

A link to the original article

• A brief summary of the problem

o When did the problem occur?

o How did the problem occur?

o Who was affected? o

How many users (or sites or companies) were affected?

o Were specific locations affected? o Were specific users affected?

• An analysis of the effect of the problem on the company or customers.

What are the consequences of this problem?

• Your suggestions on what they could have done to prevent the problem from occurring in the first place OR what they could do to prevent the problem from occurring again in the future. Format: Microsoft Word or compatible document

Solutions

Expert Solution

To: The Manager

From: XXXX

Date: April 28, 2017

Subject: Report on Disrupt of Major Websites across U.S

Dear Sir,

I have attached the detail report on Disrupt of Major Websites across US.

A link to the article is can be accessed from the below url:

https://www.nytimes.com/2016/10/22/business/internet-problems-attack.html?_r=0

Summary of the problem:

Major Websites across US were not accessible to people of the United States after a company that manages crucial part of internet’s infrastructure said it was under attack. Users reported sporadic problems reaching several websites, including Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud and The New York Times

The company, Dyn, whose servers monitor and reroute internet traffic, said it began experiencing what security experts called a distributed denial-of-service attack just after 7 a.m. Reports that many sites were inaccessible started on the East Coast, but spread westward in three waves as the day wore on and into the evening.

This Occurred in the month of October’ 2016.

How did the problem occur?:

A distributed denial-of-service attack, or DDoS, occurs when hackers flood the servers that run a target’s site with internet traffic until it stumbles or collapses under the load. Such attacks are common, but there is evidence that they are becoming more powerful, more sophisticated and increasingly aimed at core internet infrastructure providers.

Dyn is one of many outfits that host the Domain Name System, or DNS, which functions as a switchboard for the internet. The DNS translates user-friendly web addresses like fbi.gov into numerical addresses that allow computers to speak to one another. Without the DNS servers operated by internet service providers, the internet could not operate.

In this case, the attack was aimed at the Dyn infrastructure that supports internet connections. While the attack did not affect the websites themselves, it blocked or slowed users trying to gain access to those sites.

Who was affected?

Major websites like Netflix, Twitter, Spotiy, PayPal and Fox News, The New York Times and the Wall Streets were affected. Amazon's web service division also reported an outage.

The services was disrupted across Europe and US. This was widespread on both sides of Atlantic.

Consequences of this problem

The attacks underline a seious vulnerability in the way the internet functions.DNS is one of the ageing technologies which industry is struggling to update. DNS has often been neglected in terms of its security and availability. Attackers are learning to ake down the internet and are extensively testing core defensive capabilities of the companies that provide critical Internet services, which relusts in huge loss of information and revenue.

Prevention

A variety of methods allow security teams to gain insight into whats going on in a network.One of the propular approvaches is flow sampling as virtually all routers support some form of Flow technology, such as NetFlow, IPFIX or SFlow.In this process, the router samples packets and exports a datagram containing information about that packet. This is commonly available technology, scales well, and is quite adequate to indicate trends in network traffic.

Common DDoS protection deployments use a flow analytics device, which reacts to the discovered incident by redirecting the victim’s traffic to a mitigation device and telling it what action to take. This method scales well for gathering traffic to be analyzed, and the reactive model only redirects potentially bad traffic, which allows for some bandwidth oversubscription. But this is risky business as the mean time to mitigate can run into minutes.

For the most insightful detection and fastest mitigation, you can’t beat in-path deployment of a high-performance DDoS mitigation device that is able to detect and mitigate immediately. In-path deployment allows for continuous processing of all incoming traffic (asymmetric) and possibly also the outgoing traffic (symmetric). This means the mitigation device can take immediate action, providing sub-second mitigation times. Care should be taken that the mitigation solution is able to scale with the uplink capacity, and the real-world performance during multi-vector attacks.

As an alternative to in-path detection and sampling, mirrored data packets provide the full detail for analysis, while not necessarily in the path of traffic. This allows for fast detection of anomalies in traffic, which may have entered from other entry points in the network. While setting up a scalable mirroring solution in a large network can be a challenge, it can also be an excellent method for a centralized analysis and mitigation center.

Best Regards

XXXXX


Related Solutions

Describe one cybersecurity attack that has occurred in the past 6 months, and based on your...
Describe one cybersecurity attack that has occurred in the past 6 months, and based on your understanding of this week’s readings, explain what vulnerabilities within the organization may have contributed to the breach.
Financial Accounting You will each find an article from the past three months that relates to...
Financial Accounting You will each find an article from the past three months that relates to the topics such as long-term liabilities (i.e. debt) or stockholders’ equity.  There are many topics to select from including financial statements, company performance, ethics, inventory, receivables, liabilities, issuing stocks, etc. submit a thread of 200-400 words to summarize the article selected and identify how the article relates to topic(s). You must reference a minimum of two sources. Be sure to not plagiarize, but paraphrase sources....
search current news (less than 6 months old) and find an article about a company reporting...
search current news (less than 6 months old) and find an article about a company reporting key financial news (e.g., landing a large contract, reporting unusual profits or losses, expressing concern for future profitability, etc.). Briefly review the news item and include the proper APA citation for that article. Why was your chosen financial event newsworthy, i.e., why do you believe this news was important? Also, why did this particular article catch your attention? Please do not duplicate articles; before...
Problem 6-23 (Algorithmic) Find the shortest route from node 1 to node 7 in the network...
Problem 6-23 (Algorithmic) Find the shortest route from node 1 to node 7 in the network shown. If the constant is "1" it must be entered in the box. If your answer is zero enter "0". For negative values enter "minus" sign (-). Min x12 + x13 + x14 + x23 + x25 + x32 + x35 + x46 + x52 + x53 + x56 + x57 + x65 + x67 s.t. Flow Out Flow In Node 1 x12 +...
Find an article about an intellectual property issue that has occurred recently and discuss it with...
Find an article about an intellectual property issue that has occurred recently and discuss it with two references.
Find an article that interests you regarding internal audit. Discuss the article and what you have...
Find an article that interests you regarding internal audit. Discuss the article and what you have learned about internal auditing from the article. How is what you learned different from what an external auditor would do?
Find an article related to the passage of the State of Illinois budget this past July....
Find an article related to the passage of the State of Illinois budget this past July. Discuss the process, compromises (if any), and the driving forces behind the passage of the state’s first budget since 2015.
1. Find an article about an intellectual property issue that has occurred recently and discuss it...
1. Find an article about an intellectual property issue that has occurred recently and discuss it with two references.
ABC company incurred the following maintainance costs during the past 6 months Table 1 Months Machine...
ABC company incurred the following maintainance costs during the past 6 months Table 1 Months Machine hours Cost $ 1 20 4560 2 40 9780 3 50 10920 4 60 11280 5 30 6320 6 90 18920 7 25 5140 8 43 10500 9 70 12400 REQUIRED Part 1 A. Use the data on Table 1 , estimate the variable and fixed cost of the company using the high and low method B. Develop a cost function for the company....
Go to the internet and find a news article published within the last two months that...
Go to the internet and find a news article published within the last two months that discusses which direction interest rates are heading, summarize key points and post in the Discussions area. In your response please include the current and projected levels of interest rates.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT