logo

Preventive Mechanisms Against DoS Attacks

13 Pages3895 Words485 Views
   

Added on  2023-04-24

About This Document

This study material from Desklib discusses the preventive mechanisms against DoS attacks. It covers topics such as filtering spoofed packets, Martian IP filtering, egress/ingress filtering, and more. The study material also includes an introduction to DoS attacks and their types, such as SYN Flood, HTTP Flood, and DDoS attacks.

Preventive Mechanisms Against DoS Attacks

   Added on 2023-04-24

ShareRelated Documents
DOS ATTACKS
Student name
Course Title
Course Code
Student Code
Submission Date
Preventive Mechanisms Against DoS Attacks_1
Table of Contents
Literature Review.......................................................................................................................3
Authentication and Identification...........................................................................................3
Authorization..........................................................................................................................3
Auditing..................................................................................................................................3
Confidentiality........................................................................................................................3
Data integrity..........................................................................................................................4
Introduction................................................................................................................................4
SYN Flood.............................................................................................................................5
HTTP Flood...........................................................................................................................5
Distributed Denial of Service Attacks (Ddos).......................................................................6
Preventive Mechanisms.............................................................................................................6
Filtering Spoofed Packets......................................................................................................6
The Martian IP Filtering and Source IP Validation...............................................................7
Egress/Ingress Filtering..........................................................................................................7
Route -Based Filtering...........................................................................................................7
SAVE Protocol.......................................................................................................................8
Self-certifying IP Addresses..................................................................................................9
The HIPs.................................................................................................................................9
AIP.........................................................................................................................................9
SOS........................................................................................................................................9
Secure Overlay Service........................................................................................................10
Secure-i3..............................................................................................................................10
Network Protective Measures..............................................................................................11
Router installation................................................................................................................11
Bandwidth............................................................................................................................11
Reverse proxy.......................................................................................................................12
Preventive Mechanisms Against DoS Attacks_2
Geographical area.................................................................................................................12
Infrastructure defensive measures........................................................................................12
Software status.....................................................................................................................13
Deactivation of Unnecessary server ports............................................................................13
Summary..................................................................................................................................13
Conclusion................................................................................................................................13
Preventive Mechanisms Against DoS Attacks_3
Literature Review
A network which refers to a group of two or more devices that can communicate is of great
significance since it enhances communication for instance through emails, sharing of
hardware devices such as printers, data, information and software sharing just to mention a
few and most often our networks are prone to insecurity.
Network security is an activity intended to protect the usability and integrity of data and
network. It comprises of software and hardware technologies. Effective network security
monitors access to the network targeting a number of threats and hinders them from
inflowing on our network.
Most commonly used mechanisms to secure a network include:
Authentication and Identification
Identification refers to the ability of identifying a user of a system uniquely or a software
utility is running in a computing system. On the other hand, Authentication denotes to the
ability to prove that a computer user or software application is honestly who that individual
or what that software application claims to be.
Authorization
Authorization protects resources in a computing system by restricting access only to
authorized clients and their software utilities. It limits the unauthorized use of resources or
the use of resources in a manner which is not unauthorized.
Auditing
Auditing denotes to the process of footage and examining events to detect whether any
unanticipated or illegal activity has taken place, or whether any attempt has been made to do
such action.
Confidentiality
The confidentiality service safeguards sensitive data from illegal disclosure.
Data integrity
The data integrity facility detects just in case there has been unlawful alteration of
information.
It should be noted that DoS is not the only example of network attack, other common
network attacks include:
Preventive Mechanisms Against DoS Attacks_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Report On Cloud Computing Security | Data Protection
|9
|2109
|168

Network Design Proposal for XYZ Retails
|15
|873
|395

Assignment on Risks and Risk Management
|11
|781
|13

Assignment on Cyber Security 2022
|7
|712
|26

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.
|14
|2762
|18