COM 411 EXERCISE 2 8th 15th May 2020

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

WELCOME TO Exercise TWO: Basic concept of denial-of-service attacks

In this lesson you will understand


1. the nature of Denial-of-Service Attacks and Defenses against Denial-of-
Service Attacks.
2. Distributed Denial-of-Service Attacks and Responding to a Denial-of-Service
Attack .
We are expected to be able to
1. Explain the basic concept of a denial-of-service attack.
2. Describe the nature of flooding attacks: ICPM Flood, UDP Flood, TCP
SYN Flood
3. Describe distributed denial-of-service attacks and Architecture.
4. Present an overview of reflector and amplifier attack: Reflection Attacks,
Amplification Attacks, DNS Amplification Attacks.
5. Summarize some of the common defenses against denial-of-service attacks:
Attack prevention and preemption (before the attack), Attack detection and
filtering (during the attack), Attack source traceback and identification (during
and after the attack), and Attack reaction (after the attack)
6. Summarize common responses to denial-of-service attacks.

Your Resources (References) .


CAMP05 Campbell, P. “The Denial-of-Service Dance.” IEEE Security and
Privacy , November–December 2005.
CARL06 Carl, G., et al. “Denial-of-Service Attack-Detection Techniques.”
IEEE Internet Computing , January–February 2006.
CHAN02 Chang, R. “Defending Against Flooding-Based Distributed Denial-
of-Service Attacks: A Tutorial.” IEEE Communications Magazine, October
2002.
CHEU06 Cheling, S. “Denial of Service Against the Domain Name System.”
IEEE Security and Privacy , January–February 2006.
HAND06 Handley, M., and Rescorla, E. Internet Denial-of-Service
Considerations. RFC 4732, November 2006.
KAND05 Kandula, S. “Surviving DDoS Attacks.” ;login , October 2005.
LIU09 Liu, S. “Surviving Distributed Denial-of-Service Attacks.” IT Pro ,
September/October 2009.
MOOR06 Moore, D., et al. “Inferring Internet Denial-of-Service Activity.”
ACM Transactions on Computer Systems , May 2006.
PENG07 Peng, T.; Leckie, C.; and Rammohanarao, K. “Survey of Network-
Based Defense
Mechanisms Countering the DoS and DDoS Problems.” ACM Computing
Surveys , April 2007.
SCAR08 Scarfone, K.; Grance, T.; and Masone, K. Computer Security
Incident Handling Guide . NIST Special Publication 800-61, March 2008.

Global Justice Information Sharing Initiative Security Working Group. (2004).


Applying security practices to justice information sharing. Retrieved
From
http://www.it.ojp.gov/documents/200404_ApplyingSecurityPractices_v_2.0.pdf
Sayana, S. A. (2003). Approach to auditing network security. Information
Systems Audit and Control Association, 5. Retrieved from
http://www.isaca.org/Journal/Past-Issues/2003/Volume-5/Pages/Approach-to-
Auditing-Network-Security.aspx
Aguboshim, F. C. (2019). Introduction to Computer security (1st ed.). Ogui
New Layout Enugu, Nigeria. Klap Publishers. Chapter 7 and 8.

Note
[PENG07] is an excellent survey of DoS attacks and defenses. Another
comprehensive survey is [HAND06]. [CAMP05], [CARL06], [CHEU06],
[KAND05], and [MOOR06] all detail academic research on DoS attacks and
detection. [SCAR08] includes some guidance on types of DoS attacks and how
to prepare for and respond to them. CHAN02] provides suggestions for
defending against DDoS attacks. [LIU09] [ is a short but useful article on the
same subject.
Make your research and finding using the above resources or any other
resources and start your posting from Monday
All postings with respect to Lessons TWO STARTS ON MONDAY 11TH
MAY 2020 AND ENDS ON THURSDAY 15TH MAY 2020
ANY VIOLATION OF THESE INSTRUCTION WILL BE PENALISED
ACCORDINGLY.
BE GUARDED.
Question
1. Differentiate between the basic concept of denial-of-service (DoS) and
distributed denial-of-service (DDoS) attacks.
2. What are the THREE TYPES of DoS and DDoS attacks
3. What are the motives for denial-of-service attacks.
4. How can one detect denial-of-service attacks.
5. Mention way to prevent denial-of-service attacks.
6. How can one stop denial-of-service attacks on your routers
Please remember ALL POSTINGS WHATSOVER START ON Tuesday .
Also remember to cite your facts accompanied with corresponding references
using APA style.
Best Regards
Pastor. Dr. Felix Aguboshim

You might also like