This document provides an overview of security attacks and attackers, focusing on Distributed Denial of Service (DDoS) attacks and identity theft. It discusses the scenario, determination of network traffic, types of attacks and their impacts, motivation behind the attacks, and countermeasures. The document also includes references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY ATTACK AND ATTACKERS Security Attack and Attackers Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Scenario Description........................................................................................................................3 Determination of network traffic for the attack...............................................................................3 Type of Attack and Impact..............................................................................................................4 Motivation of Attack........................................................................................................................5 Countermeasures..............................................................................................................................5 References........................................................................................................................................7
Scenario Description The overall development of technology has touched the various zones of life. Along with these, it has opened up new doors where data can be stolen in the present scenario. It is mainly done for the criminals who want huge amount of financial gains (Stallings, 2017). In some of the cases, it is seen that victims become very much unaware of overall risk and effect of cyber- attack. Denial of Services:In the given scene, hackers tend to disrupt the overall services which are being given to the user. The scenario that is being described is that 200 users who intend to login into the system for making use of the website (Laet & Schauwers, 2005). Just on a single day, security team has noticed the point that in between the time 9 am to 10 am the total number of login request has exceeded the value of 1000. This particular action result in suspicion activity where the following step is all about identifying the attempts is successful or not. Identifying the theft:Identification of theft is known to be as one of the harmful areas for cyber-attack. If anyhow the attacker gets the information, then collected information can be used for creating digital footprint that can result in the instance of cyber investigation Stallings, 2017). This particular information can be used by criminals who make use of it at the instance of cybercrime. Determination of network traffic for the attack Distributed Denial of Services (DDoS) can be stated as a malicious way which is needed of disrupting normal traffic in the given target server. DDoS attack tends to work by making use of black hole routing (Laet & Schauwers, 2005). As soon as the given solution is available on the given virtual network, a black is created which is needed for routing both tunnel and traffic in the
route. Black hole filter is mainly implemented without any kind of restriction which can be used by both legitimate and malicious network. It is mainly routed and dropped completely from the given network. At the time of DDoS attack, Internet service provider can easily site the given traffic like a black hole similar to a defence. There has been evidence of network traffic monitoring that has been discovered in the last few years. For various organization, regular monitoring of traffic is considered to be a vital aspect (Yan & Yu, 2015). The point can be considered that two-factor authentication to customer is considered to be an important aspect. It is mainly needed for analysing the overall login attempts for getting access to respective account. Type of Attack and Impact Distributed Denial of Service (DDoS) mainly tends to affect the confidentiality of the user. It mainly prevents the user from getting easy access to devices and network information as a result of malicious cyber threat attackers. This particular attack mainly tends to affect the various aspect of user like email, website and lastly online accounts. It merely tends to affect some other kind of services which rely on the given system and network (Rasti et al., 2015). Denial of services mainly tends to work by making use of flooding of given network until and unless target cannot respond. It is all about preventing access to the legitimate user. DDoS attack can easily result in huge amount of cost to the given organization in terms of cost and money. In identity theft attack, the overall effect is obtained on the piece of personal information. Identity theft is mainly being of two types that is true name and takeover of attack. The true name is used for collecting information by making use of personal information that is needed for opening up new account (Dolk et al., 2017). Account takeover aims to look for data by making use of personal information; it is mainly needed for having access to the personal account.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Identity theft mainly tends to impact on the imposter by making use of personal information which is needed for gaining access to the account. In most of the cases, the thief aims to make changes in the mailing address. Motivation of Attack In identity theft attack, the main focus is on the key pieces of personally identifiable information like licence number of diver. In this attack, the required information is mainly needed for collecting all the required information which is needed for collecting required details of credit card (Hui, Kim & Wang, 2017). The overall theft can easily result in opening up credit card information like establishment of new checking account which is needed for obtaining blank checks. In the instance of identity theft, account take-over focus on imposter of use of personal information which is needed for gaining access to personal accounts. DDoS attack is relatively inexpensive which has huge amount of impact on the business. In most general cases, DDoS attack can easily last on the given single day which is bought to around 500 dollars on the web platform (De Persis & Tesi, 2015). It can result in huge amount of financial cost where unavailability of service can damage the overall reputation of the given organization. With time, DDoS attacktends to become ten times bigger as server were used along with system. Countermeasures Identity theft:There is large number of ways which can used for preventing identity theft like user are suggested to make individual check on the given credit card reports. The mere attention is paid to the billing cycle along with following up of credit card bills do not arrive in given time (Kandoi & Antikainen, 2015). Also, people need to destroy the application of credit
card along with looking for any kind of unauthorized transaction on the given element (Hui, Kim & Wang, 2017). User should not provide any kind of personal informationconcerning any kind of unsolicited mail. DDoS attack:User needs to take up six steps for preventing DDoS attack like ï‚·Identifying the attack on the beginning stage. ï‚·Bandwidth provision ï‚·Defending the network parameter ï‚·Making a call to ISP provider. ï‚·Making a call to the specialist of DDoS mitigation.
References De Persis, C., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service.IEEE Transactions on Automatic Control,60(11), 2930-2944. Dolk, V. S., Tesi, P., De Persis, C., & Heemels, W. P. M. H. (2017). Event-triggered control systemsunder denial-of-service attacks.IEEE Transactions on Control of Network Systems,4(1), 93-105. Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks.Mis Quarterly,41(2), 497. Kandoi, R., & Antikainen, M. (2015, May). Denial-of-service attacks in OpenFlow SDN networks.In2015IFIP/IEEEInternationalSymposiumonIntegratedNetwork Management (IM)(pp. 1322-1326). IEEE. Laet, G., & Schauwers, G. (2005).Network security fundamentals. Indianapolis, Ind.: Cisco Rasti, R., Murthy, M., Weaver, N., & Paxson, V. (2015, May). Temporal lensing and its application in pulsing denial-of-service attacks. In2015 IEEE Symposium on Security and Privacy(pp. 187-198). IEEE. Stallings, W. (2017).Cryptography and Network Security. Harlow, United Kingdom: Pearson Education Limited. Yan,Q.,&Yu,F.R.(2015).Distributeddenialofserviceattacksinsoftware-defined networking with cloud computing.IEEE Communications Magazine,53(4), 52-59.