Description The course Module #4 covers very important concepts of how Denial of Service (DoS) attac

Description

The course Module #4 covers very important concepts of how Denial of Service (DoS) attacks work. However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or Distributed DoS). The task of this individual assignment is to write a research paper/report.

 

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Topic of the Paper:

Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks.

 

Assignment Guidelines

The following must be considered when you write the paper:

  1. Select 3-4 research papers (in addition to those provided/suggested for the class) which discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:
  2. The research papers must be published by a peer reviewed journal or be published in conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.). Use the UMUC online library resource if necessary.
  3. You must not choose papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.).
  4. Briefly explain your rationale for selecting a specific research paper.
  5. Allocate sufficient time to read the research papers. Reading a research paper requires more time than most people realize.
  6.  

    1. Summarize each research paper and identify a combined total of three different detection, mitigation, or prevention techniques described in EACH of the papers you selected. For example: you can have a) one detection + two prevention methods, OR b) one detection + two mitigation methods, OR c) one detection + one prevention + one mitigation

    Further Instructions:

    1. Describe how each technique works. Clearly describe (in detail using your own words), how each technique works. Assume that you are explaining the authors technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and assume the student has no knowledge of the authors research (never read the article before). Discuss each technique or method using the following questions:
    2. Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.
    3. What are the strengths and weaknesses (limitations) of this technique?
    4.  

      1. Make sure there are No IPR (Intellectual Property Right) issues. This requires the following:
      2. Re-draw all figures and tables.
      3. Summarize all concepts using your own words.
      4. Do not copy any part of text or unmodified figures (short quotes are acceptable.)
      5. Cite references as needed using APA format.
      6.  

        1. To support your claims or statements, you may cite/reference non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs).

        Submission Guidelines

        • Print format: MS Word or PDF format.
        • The general structure of your research paper:
        1. Name and Title
        2. Brief Intro
        3. Background (if needed)
        4. Main Sections
        5. Conclusion (if needed)
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"