CSEC640 – Individual Assignment #1
DUE DATE: End of Week 5 (Two Week assignment – Week 4 and Week 5).
The course Module #4 covers very important concepts of how Denial of Service (DoS) attacks work. However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or Distributed DoS). The task of this individual assignment is to write a research paper/report.
Topic of the Paper:
Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks.
The following must be considered when you write the paper:
- Select 3-4 research papers (in addition to those provided/suggested for the class) which discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:
- The research papers must be published by a peer reviewed journal or be published in conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.). Use the UMUC online library resource if necessary.
- You must not choose papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.).
- Briefly explain your rationale for selecting a specific research paper.
- Allocate sufficient time to read the research papers. Reading a research paper requires more time than most people realize.
- Summarize each research paper and identify a combined total of three different detection, mitigation, or prevention techniques described in EACH of the papers you selected. For example: you can have a) one detection + two prevention methods, OR b) one detection + two mitigation methods, OR c) one detection + one prevention + one mitigation
- Describe how each technique works. Clearly describe (in detail using your own words), how each technique works. Assume that you are explaining the author’s technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and assume the student has no knowledge of the author’s research (never read the article before). Discuss each technique or method using the following questions:
- Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.
- What are the strengths and weaknesses (limitations) of this technique?
- Make sure there are No IPR (Intellectual Property Right) issues. This requires the following:
- Re-draw all figures and tables.
- Summarize all concepts using your own words.
- Do not copy any part of text or unmodified figures (short quotes are acceptable.)
- Cite references as needed using APA format.
- To support your claims or statements, you may cite/reference non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs).
- Print format: MS Word or PDF format.
- The general structure of your research paper:
- Name and Title
- Brief Intro
- Background (if needed)
- Main Sections
- Conclusion (if needed)
- The paper length: 6-10 double space pages (good, solid content which is factual, relevant, and concise), not including the cover page and reference page(s).
- Follow the APA format.
- Upload your report to your Assignment Folder
- DUE DATE: End of Week 5 (Two Week assignment – Week 4 and Week 5).
Grading Criteria – CSEC640 IA #1
This assignment is worth 10 percent of your total grade. Grading rubrics are in the classroom.
The growth and advancement of technology have enhanced communication and connectivity between computer systems through networks and the Internet. The internet was developed to enhance communication and interaction among people across the globe. Various devices have been developed to allow users to visit the various resources such as websites and online services. The increase in internet devices has grown significantly since the first computer was developed. The growth is attributed to the widespread penetration and use of the internet in the globe. As the trend continues, the concept of the internet of things is gaining traction. The development of the concept will see more devices connected to the internet as people adapt smart homes, cars, among other gadgets to improve their wellbeing and productivity. Additionally, there has been an increase in malicious activities, such as hacking attacks that jeopardize operations (Parwani, Dutta, Shukla, & Tahiliyani, 2015). Hackers and malicious individuals have sharpened their skills and the number of preys has increased. The major motivation for their activities is the financial gain, corporate espionage and personal achievements. They use various approaches to carry out their actions such as malware, Trojans and denial of service and distributed denial of service attacks. The choice of the various forms of attack depends on the target, the goal and skills of the attacker. Denial of Service (DoS) or Distributed Denial of Service (DDoS) alludes to attacks on computer systems that are designed to exhaust the user’s bandwidth or disrupt their access to services (Sachdeva, Mahajan, & Sachdeva, 2015). The denial of service(DoS) attacks make resources limited to the user, but available to the attacker. For instance, an attacker can flood traffic to a specific website rendering legitimate visitor to the website unable to access the services offered by the website. The attack can last hours depending on the sophistication of the attack and the response of the resource administrators. In the recent past, denial of service (DoS) attacks have become popular, making it a key concern for securing the system. The intent of this paper is to determine the approaches that can be employed in detection, prevention, and mitigation of such attacks. The research by Sachdeva et al. (2015) provides an overview of denial of service (DoS) and distributed denial of service (DDoS) attacks. The study reviews a number of studies that survey various forms of attacks and techniques applied in distributed denial of service attacks and their countermeasures. Sachdeva et al. (2015) research is instrumental as it provides valuable information on-detection, defense, and mitigation, as well as traceback techniques. Kim (2013) offers a detailed account of the implications of denial of service attacks have on internet operations. The author alludes that these attacks create bottlenecks, which prevent legitimate services. In this light, Kim (2013) discusses various types of denial of service attacks and provides a means of how they can be detected, prevented, and mitigated. The selection of this study is in line with the requirements of this paper. Another research used in this article is that of Parwani et al. (2015), which addresses denial of service attacks in cloud computing. Reviewing this research will be imperative in supplementing the other sources, which focus on denial of service and distributed denial of service attacks on other forms of networks…