.

Wednesday, February 27, 2019

Recommendation to Counter DoS Attack

barrack in an executive summary mea sure enoughs to counter this type of DoS Attack.The university net income was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator approaching. We suspect that the attacker gained access to the network from an internal computer, most presumable from a student PC in one of the labs. The attacker in all probability used keylogger software to discover administrator credentials.Once the attacker had the administrator access the systems he/she was able to create BOTs and push to legion(predicate) student PCs determined in various labs. The attacker then initiate a catch attack by activating the BOTs in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unserviceable to students (ICECC, 2009). It is important to note that a single BOT alone could not lease cause the registration server unavailable. It was the combined effect of using many BOTs at once that produced the attackers desired effect of overflowing the resources of the registration sack up server and rendering it unusable.Recommendation to Counter this type of DoS attackTo prevent or limit the impact of keyloggers Deploy a firewall to block known keylogger software. machinate facility not to open email from unknown users and not to slammer on links in emails from unknown users. Create a indemnity whereby users butt jointnot install forward-looking software to a machine without opening a ticket with the helpdesk or requesting administrator access (ICECC, 2009). The student computers should be preloaded with all required applications.Deploy a file monitoring program, such as Tripwire to detect and notify if any changes have occurred to files (ICECC, 2009). Passwords should always be encrypted and neer traverse the network in the clear. Harden Windows by making sure that the operating system are keep current with latest patches (ICECC, 2009). appreciation anti-virus, an ti-spyware programs up-to-date.Install firewall packages on all computers. Deploy an intrusion-detection (IDS) and intrusion-prevention systems (IPS). Segmenting off network with the use of routers or firewalls is another method (Schifreen, 2006). However, the routers or firewalls will have to be tack together to detect and block suspected BOT traffic (please see network draw for item with Blue Dotted Squares).ConclusionIt is important to note that there is no method that will secure a network totally from attack. However, we can prevent some of the most common attack vectors. Therefore shelter personnel must remain vigilant and seek to prevent the new level of attack (Schifreen, 2006).

No comments:

Post a Comment