Career Relevancy
Denial-of-Service (DoS) and Distributed Denial of Service (DDoS) attacks have become a major threat to present computer networks. These attacks attempt to make a machine or network resource unavailable to its authorized users. Usually, DoS/DDoS attacks exploit vulnerabilities in the implementation of TCP/IP model protocol or bugs in a specific operating system.
Background:
Denial of Service, or DoS, is an attack on a computer or network that reduces, restricts, or prevents accessibility of system resources to its legitimate users. In a DoS attack, attackers flood a target system with traffic to overload its resources. This in turn brings the system down, leading to disabling of the target’s website, or a significant slowing of the target’s network performance. The goal of a DoS attack is not necessarily to gain unauthorized access to a system or to corrupt a target’s data. Instead, the objective in a DoS attack is to prevent authorized users from using a system.
In general, DoS attacks target network bandwidth or connectivity. Bandwidth attacks overflow the network with a high volume of traffic using existing network resources, thus depriving legitimate users of these resources. Connectivity attacks overflow a computer with a large amount of connection requests, consuming all available resources of the OS so that the computer cannot process legitimate users’ requests.
Imagine a pizza delivery company that does most of its business over the phone. If an attacker wanted to target this business, they might figure out a way to tie up the company’s phone lines, making it impossible for the company to do business. That is how a DoS attack works; the attacker creates a blockade that prevents customers from connecting to the system, making it impossible to conduct business.
DoS attacks can harm the target in terms of time and resources. However, failure might mean the loss of essential services, such as email capabilities. In a worst-case scenario, a DoS attack can mean the accidental destruction of the files and other Internet programs people might be using at the time of the attack.
A Distributed Denial-of-Service (DDoS) attack is a large-scale, coordinated attack on the availability of services on a target’s system or network resources, launched indirectly through botnets on the Internet.
DoS/DDoS is one of the foremost security threats on the Internet, thus there is a greater necessity for solutions to mitigate these attacks.
While DoS and DDoS attacks can be eradicated, early detection techniques help to prevent DoS/DDoS attacks, and prevention is the greatest defense for a network. Detecting a DoS/DDoS attack is a tricky job. A DoS/DDoS attack traffic detector needs to distinguish between a genuine data packet and a bogus one, which is not always possible. The techniques employed for this purpose are not perfect. There is always a chance of confusion between traffic generated by a legitimate network user and traffic generated by a DoS/DDoS attack. Detection techniques are based on identifying and discriminating the illegitimate traffic increase and flash events from legitimate packet traffic.
One problem in filtering traffic is the volume. It is impossible to scan each data packet to ensure security from a DoS/DDoS attack. All the detection techniques used today to define an attack as an abnormal and noticeable deviation in network traffic statistics and characteristics. These techniques involve statistical analysis of deviations to categorize malicious and genuine traffic.
Implementing defensive mechanisms in appropriate places and following proper measures allows the heightening of organizational network security. First, be sure to use strong encryption mechanisms such as WPA2 and AES 256 for broadband networks to withstand against eavesdropping. Ensure that the software and protocols are up-to-date and scan the machines thoroughly to detect any anomalies. Update kernel to the latest release and disable unused and insecure services. Block all inbound packets originating from the service ports in order to block the traffic coming from reflection servers. Enable TCP SYN cookie protection. And lastly, prevent the transmission of the fraudulently addressed packets at the ISP level.
Prompt
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Your initial and reply posts should work to develop a group understanding of this topic.
For your citation, you might use articles that show examples of DoS and DDoS attacks of the past, and what the outcome was.
Reply Requirements:
You must submit:
1 main post of 200+ words with 2 in-text citations and references (follow the Institution Writing Guidelines)
Institution Writing Guidelines 300-400 LVL
Purpose: The Institution Writing Guidelines (IWG) exist to simplify student writing requirements and instructor grading, clarify and standardize writing expectations, focus instructor grading and student effort on content, and gradually introduce students to more complex and restrictive writing guidelines over time.
Below you will find the detailed information for your 300 and 400 level courses:
· Formatting (Specific to 300-400 level courses)
· Grammar/Spelling
· Sources (Specific to 300-400 level courses)
· Plagiarism
Formatting
· The top of the paper needs:
· Student name
· Date of submission or writing
· Course name
· Title of the paper
· It is recommended the paper identification information be placed at the top right. What matters is the information is present. Example:
· The paper should be set with one-inch margins all around
· 12-point font sans serif or serif, no decorative fonts. Recommended—but not mandatory—fonts include: Serif family (Times New Roman, Book Antiqua, Minion Pro), Sans Serif family (Calibri, Arial, Verdana)
· Double spacing lines is required
Grammar/Spelling
· General spelling, grammar, and punctuation expectations apply. The focus of the writing must address the issues raised by the prompt, emphasized in the rubric, and the learning objective(s) covered by the writing task
· The serial comma is expected (example: word, word, word, and word)
· Double-spacing after sentences is discouraged
Sources
· Students are expected to use citations, including in-text citations as needed. The guidelines are:
· In Text
· The Author, Year, page number (for quotes) format. Ex: (Doe, 2016, pp. 23-25)
· Sentence punctuation follows the in-text citation
· Reference Citation
· Example 1: Martinez, A. (2016). The way things should be. Harper.
· Example 2: Martinez. (2016). The way things should be. Retrieved, March 4, 2018, from
https://worldswisdom.com
· References are not to be graded on punctuation, italics, inclusion of initials, date format, etc. Grading for references will focus on the required basic elements not the presentation of the elements.
· Rubrics will be followed and the focus remains on content, not style
Plagiarism
Plagiarism is not acceptable. Instructors should follow the academic policy on plagiarism. Egregious examples of plagiarism or repetitive plagiarism will be referred to the student’s dean for additional evaluation.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.