Question.4618 - Assignment | GradedAssociated objectives:Differentiate between common network attacks and how they work, includingDenial-of-service attacksDistributed denial-of-service attacksHost-based attacksEvaluate the applicability of network defense methods to prevalent attack typesInstructionsAnswer each of the questions below with a few sentences. Be brief, but fully explain your answer. The assignment poses 5 questions. Each is worth 10 points.Explain what an IPSweep and a PortSweep type of attack are.In a few words, describe the operation of buffer overflow attacks.Describe and explain denial of service (DoS) and distributed denial of service (DDoS) network attacks.Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics.What countermeasures would you recommend as defense against these types of attacks?Assignment due: Sunday, 11:59 p.m. ETPlagiarismYou are expected to write primarily in your own voice, using paraphrase, summary, and synthesis techniques when integrating information from class and outside sources. Use an author’s exact words only when the language is especially vivid, unique, or needed for technical accuracy. Failure to do so may result in charges of academic dishonesty.Overusing an author’s exact words, such as including block quotations to meet word counts, may lead your readers to conclude that you lack appropriate comprehension of the subject matter or that you are neither an original thinker nor a skillful writer.
Answer Below:
Weekly xxxxxxxxxx Adonis xxxxxxxxxxxxx TechMGT xxxxxxxxx Herbert xxxxxxxxxxxxxxxxxx th xxxxxx Assignment xxxxxxx according xxx information xxxx the xxxxxxx by xxxxxxx et xx IPSweep xxxxxx involves xx attacker xxxxxxxxxxxxxx sending xxxx echo xxxxxxxx ping xxxxxxxx across x network xxxxx identifying xxxxxx hosts xxxxx is xxxxxxxxxxxxxx technique xxxx to xxxxxxxxx which xx addresses xxx in x user xxxxxx a xxxxxx network xxxxxxx the xxxxx for xxxxxxx exploitation xxxxxxx While xx the xxxxx hand x PortSweep xxxxxx tends xx involve xxxxxxxx multiple xxxxx on x single xxxxxx host xx identify xxxx services xxxxx is xxxxxxxxx conducted xxxxxxxxx TCP xxx scans xx UDP xxxxx to xxxxxxxxx the xxxxxxxx are xxxxxxx on x machine xxxxxxxx an xxxxxxxx to xxxxxxxx potential xxxxxxxxxxxxxxx Shanker xx al xxxxxxxx considering xxxxxxxxx of xxxxxx overflow xxxxxxx exploit xxxxxxxxxxxxxxx in xxxxxx handling xx overwriting xxxxxxxx memory xxxxxxxxx leading xx erratic xxxxxxx behavior xxxxxxx or xxxx remote xxxx execution xxxxxxx the xxxxxxxxxxx are xxxxxxxx when xx attacker xxxxxx excessive xxxxxxx into x fixed-size xxxxxx that xxxxxxxxx its xxxxxxxx and xxxxxxxxxxx overwriting xxxxxxxxx return xxxxxxxxx thereby xxxxxxxx programs xxxxxxxxx flow xxxxx is xxxxx done xx injecting xxxxxxxxx shellcode xx gain xxxxxxx over xxx compromised xxxxxx Mullen xxxxx Thirdly xxxxxxxxx to xx understanding xxxx Singh xxx Gupta x report x DoS xxxxxx aims xx overwhelm x target xxxxxx with xxxxxxxxx network xxxxxxx or xxxxxxxxxxxxx requests xxxxxxx to xxxxxxxx exhaustion xxx service xxxxxxxxxxxxxx wherein xxx attacks xxxxxxx a xxxxxxxxxxxxx in xxxxxxx protocols xx application-layer xxxxxxxx causing xxxxxxxxxx users xx experience xxxxxxxxxxx degradation xx complete xxxxxxx failure xx the xxxxx hand xxxx attacks xxx sophisticated xxxxxxx multiple xxxxxxxxxxx systems xxxxx part xx a xxxxxx simultaneously xxxxxx coordinated xxxxxxxx on x single xxxxxx which xxxxxxxxx the xxxxx of xxx attack xxxxxx it xxxxxx to xxxxxxxx there xxx several xxxxxxxxxx that xxx attacker xxxxxxx with xxxx SYN xxxxxx UDP xxxxxx or xxx amplification xx disrupt xxxxxxx availability xxxxx Gupta xxxxxx considering xxx routing xxxxxxx which xxxxx target xxx integrity xx routing xxxxxxxxx by xxxxxxxxxxxx route xxxxxxxxxxxxxx to xxxxxxxxx network xxxxxxx or xxxx eavesdrop xx communication xx create xxxxxxxxxxxxxxxxx conditions xxx instance xxx hijacking xxxxxx whenever xx attacker xxxxxxx advertises xxxxxxxxx of xx IP xxxxxx through xxxxxx Gateway xxxxxxxx the xxxxxx is xx misleading xxxxx network xxxx routing xxxxxxx through x malicious xxxx resulting xx traffic xxxxxxxxxxxx surveillance xx service xxxxxxxxxx Alshamrani xx the xxxx shortest xxxx first xxxxxxxx an xxxxxxxx intercepts xxx modifies xxxx State xxxxxxxxxxxxxx by xxxxxxxxxxxx the xxxxxxxx number xx force xxxxxxx to xxxxxx false xxxxxxx updates xxxxx disrupts xxx route xxxxxxxxxxxx leading xx service xxxxxxxxxxx or xxxxxx of xxxxxxx by xxxxxxxx the xxxxxxx with xxxx updates xxxxxxxxxx Considering xxxx of xxx counter-measures xxxxxxx the xxxxxxx firstly xxx IPSweep xxxxxxxxx there xx a xxxx to xxxxxxxxx intrusion xxxxxxxxx or xxxx prevention xxxxxxx like xxx IPS xx detect xxxxxxxx scanning xxxxxxxx and xxxxxx firewalls xxxx rate-limiting xxxxx to xxxxxxx excessive xxxxxxxx attempts xxxxxxxx for xxxxxxxx the xxxxxx overflow xxxxxxxxxx utilizing xxxxxxx space xxxxxx randomization xxxxx canaries xxx enforcing xxxxx coding xxxxxxxxx to xxxxxxxx buffer xxxxxxxx vulnerabilities xxxxxxx DoS xxxx defense xx by xxxxxxxxx traffic xxxxxxxxx solutions xxxx enable xxxxxxxxxxxxx policies xxx employing xxxx mitigation xxxxxxxx like xxxxxxxxx centers xx content xxxxxxxx networks xx absorb xxxxxxxxx traffic xxxxxxxxxx To xxxxxxx routing xxxxxxx implement xxx route xxxxxxxxx and xxxxxx validation xxxxxxxxxx like xxxx and xxxxxx OSPF xxxxxxxxxxxxxx mechanisms xxx in xxxxx to xxxxxxx unauthorized xxxxx manipulation xxxxxxxxxxxxxxxxxxxx H x Detecting xx prefix xxxxxx events xxxxx BGP xxxxxxxx and xx connectivity xxxxxxxx Mullen x Meany x June xxxxxxxxxx of xxxxxx overflow xxxxx attacks xx an xxx operating xxxxxx In xxxxxx IoT xxxxxx GIoTS xx - xxxx Shanker x Agrawal x Singh x Bhatt x W xxxxxxxxx for xxxxxxxxxxx network xxxxxxx through xxxxxx inspection xxxxx machine xxxxxxxx Nonlinear xxxxxxxxxxx Singh x Gupta x B xxxxxxxxxxx denial-of-service xxxx attacks xxx defense xxxxxxxxxx in xxxxxxx web-enabled xxxxxxxxx platforms xxxxxx challenges xxx future xxxxxxxx directions xxxxxxxxxxxxx Journal xx Semantic xxx and xxxxxxxxxxx Systems xxxxxx -More Articles From MGT5157: Secure Networks & Communication