For this
exercise, you will perform research and develop a brief paper on the subject
described below.
A Denial of Service (DOS)
attack typically involves the misuse of standard TCP/IP protocols or connection
processes so that the target for the DOS attack responds in a way designed to
create maximum trouble. Read the TECHNICAL FOCUS 11-2 “Inside a DoS Attack” on
page 307 and become familiar with the five common types of TCP/IP attacks.
Information from page 307:
TECHNICAL FOCUS 11-2
Inside a DoS Attack
A DoS attack typically involves the
misuse of standard TCP/IP protocols or connection processes so that the target
for the DoS attack responds in a way designed to create maximum trouble. Five
common types of attacks include the following:
ICMP Attacks The network is flooded
with ICMP echo requests (i.e., pings) that have a broadcast destination address
and a faked source address of the intended target. Because it is a broadcast
message, every computer on the network responds to the faked source address so
that the target is overwhelmed by responses. Because there are often dozens of
computers in the same broadcast domain, each message generates dozens of
messages at the target.
UDP Attacks This attack is similar to
an ICMP attack, except that it uses UDP echo requests instead of ICMP echo
requests.
TCP SYN Floods The target is swamped
with repeated SYN requests to establish a TCP connection, but when the target
responds (usually to a faked source address), there is no response. The target
continues to allocate TCP control blocks, expects each of the requests to be
completed, and gradually runs out of memory.
UNIX Process Table Attacks This is
similar to a TCP SYN flood, but instead of TCP SYN packets, the target is
swamped by UNIX open connection requests that are never completed. The target
allocates open connections and gradually runs out of memory.
Finger of Death Attacks This is
similar to the TCP SYN flood, but instead, the target is swamped by finger
requests that are never disconnected.
DNS Recursion Attacks The attacker
sends DNS requests to DNS servers (often within the target’s network) but
spoofs the from address so the requests appear to come from the target computer
that is overwhelmed by DNS responses. DNS responses are larger packets than
ICMP, UDP, or SYN responses, so the effects can be stronger.
Source: Adapted from “Web Site
Security and Denial of Service Protection,” www.nwfusion.com.
Select one attack method and conduct
research using the Internet and libraries available through your Cougar-Track
account to develop a 900-1000-word (approximately 4 double space pages)
narrative of an actual attack which used the method you selected.
Use the following list of significant
points to consider as you create your paper.
1.
Why
was the target selected? (For social, political, financial reasons?)
2.
What
was the target’s network security posture prior to the attack?
(Passively/Actively protected, indifferent about cyber security?)
3.
What
was the loss to the target? (Information, financial data, customer/personal
information?)
4.
What
secondary impact did the attack have, and to whom? (Banks, investments,
suppliers etc.)
5.
Identify
the person or organization that claimed responsibility for the attack. In
your own words, describe why you believe they performed the attack.
For this exercise, you will perform research and develop a brief paper on the su
Struggling With a Similar Paper? Get Reliable Help Now.
Delivered on time. Plagiarism-free. Good Grades.
What is this?
It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!
Why do you do it?
Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!
How does it work?
You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.
What kind of writer will work on my paper?
Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.
Our team is comprised of native English speakers working exclusively from the United States.
Will the paper be original?
Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.
Is it free?
No, it’s a paid service. You pay for someone to work on your assignment for you.
Is it legit? Can I trust you?
Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.
Will you deliver it on time?
Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.
Can you get me a good grade? It’s my final project and I need a good grade.
Yes! We only pick projects where we are sure we’ll deliver good grades.
What do you need to get started on my paper?
* The full assignment instructions as they appear on your school account.
* If a Grading Rubric is present, make sure to attach it.
* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.
* Any templates or additional files required to complete the assignment.
How do I place an order?
You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.
How will I receive my paper?
We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.
Getting Your Paper Today is as Simple as ABC
No more missed deadlines! No more late points deductions!
You give us your assignments instructions via email or through our order page.
Our support team selects a qualified writing team of 2 writers for you.
In under 5 minutes after you place your order, research & writing begins.
Complete paper is delivered to your email before your deadline is up.
Want A Good Grade?
Get a professional writer who has worked on a similar assignment to do this paper for you