Question.4457 - Assignment | GradedAssociated objectives:Differentiate between common network attacks and how they work, includingDenial-of-service attacksDistributed denial-of-service attacksHost-based attacksEvaluate the applicability of network defense methods to prevalent attack typesInstructionsAnswer each of the questions below with a few sentences. Be brief, but fully explain your answer. The assignment poses 5 questions. Each is worth 10 points.Explain what an IPSweep and a PortSweep type of attack are.In a few words, describe the operation of buffer overflow attacks.Describe and explain denial of service (DoS) and distributed denial of service (DDoS) network attacks.Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics.What countermeasures would you recommend as defense against these types of attacks?Assignment due: Sunday, 11:59 p.m. ETPlagiarismYou are expected to write primarily in your own voice, using paraphrase, summary, and synthesis techniques when integrating information from class and outside sources. Use an author's exact words only when the language is especially vivid, unique, or needed for technical accuracy. Failure to do so may result in charges of academic dishonesty.Overusing an author's exact words, such as including block quotations to meet word counts, may lead your readers to conclude that you lack appropriate comprehension of the subject matter or that you are neither an original thinker nor a skillful writer.
Answer Below:
Weekly xxxxxxxxxx Adonis xxxxxxxxxxxxx TechMGT xxxxxxxxx Herbert xxxxxxxxxxxxxxxxxx th xxxxxx Assignment xxxxxxx according xxx information xxxx the xxxxxxx by xxxxxxx et xx IPSweep xxxxxx involves xx attacker xxxxxxxxxxxxxx sending xxxx echo xxxxxxxx ping xxxxxxxx across x network xxxxx identifying xxxxxx hosts xxxxx is xxxxxxxxxxxxxx technique xxxx to xxxxxxxxx which xx addresses xxx in x user xxxxxx a xxxxxx network xxxxxxx the xxxxx for xxxxxxx exploitation xxxxxxx While xx the xxxxx hand x PortSweep xxxxxx tends xx involve xxxxxxxx multiple xxxxx on x single xxxxxx host xx identify xxxx services xxxxx is xxxxxxxxx conducted xxxxxxxxx TCP xxx scans xx UDP xxxxx to xxxxxxxxx the xxxxxxxx are xxxxxxx on x machine xxxxxxxx an xxxxxxxx to xxxxxxxx potential xxxxxxxxxxxxxxx Shanker xx al xxxxxxxx considering xxxxxxxxx of xxxxxx overflow xxxxxxx exploit xxxxxxxxxxxxxxx in xxxxxx handling xx overwriting xxxxxxxx memory xxxxxxxxx leading xx erratic xxxxxxx behavior xxxxxxx or xxxx remote xxxx execution xxxxxxx the xxxxxxxxxxx are xxxxxxxx when xx attacker xxxxxx excessive xxxxxxx into x fixed-size xxxxxx that xxxxxxxxx its xxxxxxxx and xxxxxxxxxxx overwriting xxxxxxxxx return xxxxxxxxx thereby xxxxxxxx programs xxxxxxxxx flow xxxxx is xxxxx done xx injecting xxxxxxxxx shellcode xx gain xxxxxxx over xxx compromised xxxxxx Mullen xxxxx Thirdly xxxxxxxxx to xx understanding xxxx Singh xxx Gupta's xxxxxx a xxx attack xxxx to xxxxxxxxx a xxxxxx system xxxx excessive xxxxxxx traffic xx computational xxxxxxxx leading xx resource xxxxxxxxxx and xxxxxxx unavailability xxxxxxx the xxxxxxx exploit x vulnerability xx network xxxxxxxxx or xxxxxxxxxxxxxxxxx services xxxxxxx legitimate xxxxx to xxxxxxxxxx performance xxxxxxxxxxx or xxxxxxxx service xxxxxxx On xxx other xxxx DDoS xxxxxxx are xxxxxxxxxxxxx wherein xxxxxxxx compromised xxxxxxx often xxxx of x botnet xxxxxxxxxxxxxx launch xxxxxxxxxxx assaults xx a xxxxxx target xxxxx amplifies xxx scale xx the xxxxxx making xx harder xx mitigate xxxxx are xxxxxxx techniques xxxx the xxxxxxxx engages xxxx like xxx floods xxx floods xx DNS xxxxxxxxxxxxx to xxxxxxx network xxxxxxxxxxxx Singh xxxxx Fourth xxxxxxxxxxx the xxxxxxx attacks xxxxx often xxxxxx the xxxxxxxxx of xxxxxxx protocols xx manipulating xxxxx advertisements xx misdirect xxxxxxx traffic xx even xxxxxxxxx on xxxxxxxxxxxxx or xxxxxx denial-of-service xxxxxxxxxx for xxxxxxxx BGP xxxxxxxxx occurs xxxxxxxx an xxxxxxxx falsely xxxxxxxxxx ownership xx an xx prefix xxxxxxx Border xxxxxxx Protocol xxx intent xx to xxxxxxxxxx other xxxxxxx into xxxxxxx traffic xxxxxxx a xxxxxxxxx node xxxxxxxxx in xxxxxxx interception xxxxxxxxxxxx or xxxxxxx disruption xxxxxxxxxx In xxx open xxxxxxxx path xxxxx networks xx attacker xxxxxxxxxx and xxxxxxxx Link xxxxx Advertisements xx incrementing xxx sequence xxxxxx to xxxxx routers xx accept xxxxx routing xxxxxxx which xxxxxxxx the xxxxx calculations xxxxxxx to xxxxxxx instability xx denial xx service xx flooding xxx network xxxx fake xxxxxxx Alshamrani xxxxxxxxxxx some xx the xxxxxxxxxxxxxxxx against xxx attacks xxxxxxx for xxxxxxx PortSweep xxxxx is x need xx implement xxxxxxxxx detection xx even xxxxxxxxxx systems xxxx IDS xxx to xxxxxx abnormal xxxxxxxx patterns xxx deploy xxxxxxxxx with xxxxxxxxxxxxx rules xx prevent xxxxxxxxx scanning xxxxxxxx secondly xxx tackling xxx buffer xxxxxxxx protection xxxxxxxxx address xxxxx layout xxxxxxxxxxxxx stack xxxxxxxx and xxxxxxxxx safer xxxxxx practices xx mitigate xxxxxx overflow xxxxxxxxxxxxxxx thirdly xxx DDoS xxxxxxx is xx deploying xxxxxxx filtering xxxxxxxxx that xxxxxx rate-limiting xxxxxxxx and xxxxxxxxx DDoS xxxxxxxxxx services xxxx scrubbing xxxxxxx or xxxxxxx delivery xxxxxxxx to xxxxxx excessive xxxxxxx Alshamrani xx prevent xxxxxxx attacks xxxxxxxxx BGP xxxxx filtering xxx prefix xxxxxxxxxx techniques xxxx RPKI xxx ensure xxxx authentication xxxxxxxxxx are xx place xx prevent xxxxxxxxxxxx route xxxxxxxxxxxx ReferencesAlshamrani x H xxxxxxxxx IP xxxxxx hijack xxxxxx using xxx activity xxx AS xxxxxxxxxxxx analysis xxxxxx G xxxxx L xxxx Assessment xx buffer xxxxxxxx based xxxxxxx on xx IoT xxxxxxxxx system xx Global xxx Summit xxxxx pp x IEEE xxxxxxx R xxxxxxx P xxxxx A xxxxx M x Framework xxx identifying xxxxxxx attacks xxxxxxx packet xxxxxxxxxx using xxxxxxx learning xxxxxxxxx Engineering xxxxx A xxxxx B x Distributed xxxxxxxxxxxxxxxxx DDoS xxxxxxx and xxxxxxx mechanisms xx various xxxxxxxxxxx computing xxxxxxxxx issues xxxxxxxxxx and xxxxxx research xxxxxxxxxx International xxxxxxx on xxxxxxxx Web xxx Information xxxxxxx IJSWIS xMore Articles From Computer