Active Directory: Migration, Security, and Network Technologies
VerifiedAdded on 2022/12/23
|8
|2627
|1
Report
AI Summary
This report provides a comprehensive analysis of Active Directory, focusing on the migration to the 2016 version, the benefits it offers, and the associated technologies. It delves into the core functionalities of Active Directory Domain Services, emphasizing fused resource and security administration, resource centralization, and simplified resource location. The report examines the advantages of a multi-domain model for business continuity and explores single sign-on technologies like OAuth and SAML. It also addresses DNS security, including DDoS mitigation, DNS firewalls, and risk insight, along with DHCP fault tolerance strategies. Furthermore, the report covers Hyper-V features like Replica, Shielded VMs, and routing/security protocols, including FTP, and discusses how Kris Corporation can leverage these technologies. The report concludes with a detailed discussion on the implementation of these technologies.

Active Directory
Why and how should the company migrate to 2016 AD?
Central focuses and Benefits of Active Directory Business on Phone
The Top 3 significant favorable circumstances of Active Directory Domain Services are:
Fused resources and security association
Single logon for access to overall resources
Improved resource region
Fuses Resource and Security Administration
This is the most important role of Active Directory. A more Dynamic Directory ensures singular
point where controllers can regulate and attest engineer resources and their own security needs.
An affiliation can control the Active Directory modes subject to an alternate leveled model, a
methodology, or the sorts of purposes of constrainment being controlled (Preimesberger, 2016).
For example, an affiliation could supervise Active Directory by reliably separating the customers
as shown by the divisions wherein they work, their geological region, or a blend of these
characteristics.
Dynamic Directory can make the security apparatus streamlined with the principal social
occasion of all structure resources and broaden interoperability with a wider level of jobs and
contraptions. Right when Active Directory is executed and asserted properly, it empowers the
control to vital complete an alliance's structure and approach for front line security, organize
affiliations, and resources at a masterminded level (Melber, 2014).
Ensures Resource Centralization
Dynamic Directory ensures a particular explanation behind the authorities for structure assets.
Dynamic Directory uses the principle of single sign on to engage access to deal with assets
established on any server side scripts (Preimesberger, 2019).
The client side is authenticated and authorised by the active directory once. After this strategy is
done, once signed in by the active directory, the client gets access to enterprise wide resources,
as indicated by their doled out occupations and points of interest inside Active Directory (PR
Newswire, 2019).
Why and how should the company migrate to 2016 AD?
Central focuses and Benefits of Active Directory Business on Phone
The Top 3 significant favorable circumstances of Active Directory Domain Services are:
Fused resources and security association
Single logon for access to overall resources
Improved resource region
Fuses Resource and Security Administration
This is the most important role of Active Directory. A more Dynamic Directory ensures singular
point where controllers can regulate and attest engineer resources and their own security needs.
An affiliation can control the Active Directory modes subject to an alternate leveled model, a
methodology, or the sorts of purposes of constrainment being controlled (Preimesberger, 2016).
For example, an affiliation could supervise Active Directory by reliably separating the customers
as shown by the divisions wherein they work, their geological region, or a blend of these
characteristics.
Dynamic Directory can make the security apparatus streamlined with the principal social
occasion of all structure resources and broaden interoperability with a wider level of jobs and
contraptions. Right when Active Directory is executed and asserted properly, it empowers the
control to vital complete an alliance's structure and approach for front line security, organize
affiliations, and resources at a masterminded level (Melber, 2014).
Ensures Resource Centralization
Dynamic Directory ensures a particular explanation behind the authorities for structure assets.
Dynamic Directory uses the principle of single sign on to engage access to deal with assets
established on any server side scripts (Preimesberger, 2019).
The client side is authenticated and authorised by the active directory once. After this strategy is
done, once signed in by the active directory, the client gets access to enterprise wide resources,
as indicated by their doled out occupations and points of interest inside Active Directory (PR
Newswire, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Disentangles Resource Location
Dynamic Directory ensure resource sharing permitting documents and print assets to be sent
over a more distributed system. With a more distributed system, the clients are able to access the
enterprise wide resources anywhere anytime (Melber, 2011).
This hunt can be founded on the asset's name, depiction, or area. For instance, a mutual envelope
can be found by tapping the fitting pursuit catch utilizing Network in Windows 10 or Microsoft
Windows Server 2012.
A client can design the hunt scope. The mutual organizer name and catchphrase don't should be
search criteria. Giving more search data makes increasingly explicit outcomes. For instance, in
the event that you have designed "bookkeeping" as a catchphrase for 100 envelopes, a quest for
the watchword will return 100 outcomes that a client would need to deal with to locate the ideal
organizer.
Envision you are a client in a 10 server condition, where each server has an alternate
arrangement of assets that you have to carry out your responsibility. On the off chance that you
were in this circumstance, recognizing which server gives every asset would not be a simple
assignment. This is much increasingly convoluted when you have versatile clients, for example,
a representative visiting from another site who needs to find printers and different gadgets to
wind up gainful at the new site.
Should the company remain at multi-domain model or migrate to single domain?
Multidomain model is the best option for the company as opposed to single domain as it provides
more fault tolerance incase the primary domain is down the multidomain model shall ensure key
services are provided hence providing a more robust business continuity
What technology can provide single sign on? How will it be configured?
OAuth and SAML are the two most well known conventions. Facebook, Twitter and Google are
regular general suppliers you will see on locales.
These are some well known cloud-based SSO suppliers:
AuthAnvil
OneLogin
Dynamic Directory ensure resource sharing permitting documents and print assets to be sent
over a more distributed system. With a more distributed system, the clients are able to access the
enterprise wide resources anywhere anytime (Melber, 2011).
This hunt can be founded on the asset's name, depiction, or area. For instance, a mutual envelope
can be found by tapping the fitting pursuit catch utilizing Network in Windows 10 or Microsoft
Windows Server 2012.
A client can design the hunt scope. The mutual organizer name and catchphrase don't should be
search criteria. Giving more search data makes increasingly explicit outcomes. For instance, in
the event that you have designed "bookkeeping" as a catchphrase for 100 envelopes, a quest for
the watchword will return 100 outcomes that a client would need to deal with to locate the ideal
organizer.
Envision you are a client in a 10 server condition, where each server has an alternate
arrangement of assets that you have to carry out your responsibility. On the off chance that you
were in this circumstance, recognizing which server gives every asset would not be a simple
assignment. This is much increasingly convoluted when you have versatile clients, for example,
a representative visiting from another site who needs to find printers and different gadgets to
wind up gainful at the new site.
Should the company remain at multi-domain model or migrate to single domain?
Multidomain model is the best option for the company as opposed to single domain as it provides
more fault tolerance incase the primary domain is down the multidomain model shall ensure key
services are provided hence providing a more robust business continuity
What technology can provide single sign on? How will it be configured?
OAuth and SAML are the two most well known conventions. Facebook, Twitter and Google are
regular general suppliers you will see on locales.
These are some well known cloud-based SSO suppliers:
AuthAnvil
OneLogin

Okta
DNS
Where should DNS servers reside?
Normally, each organization with a server farm has its very own DNS. In this way, most of them
are inside organizations. This kind of DNS settle inside name (like . nearby) and names of
inward servers distributed over the Internet.
Another critical part of DNS server is within facilitating server farms. These are organizations
that host sites or applications,so they have a great deal of servers distributed over the Internet.
Thus, they are probably going to have their very own DNS (Shehzad, 2019).
At long last, we have root DNS servers that thinks pretty much the various legitimate DNS
servers. They are facilitated in server farms like some other server, yet in addition stored inside
the ISP system to decrease the measure of traffic to different ISPs so as to come to the "first"
root DNS (Vinayakumar et al., 2018).
What kind of DNS security can the DNS servers leverage?
DDoS
The main sort of DNS security is conveyed because of an unmistakable kind of risk:
disseminated refusal of administration assaults, or DDoS. In a DDoS assault, a server is
immersed with DNS reactions, regularly produced by bots or malware from captured PCs around
the globe utilizing a ridiculed source address, the location of the objective, and reflected off of
open DNS servers. This tsunami of DNS reactions overpowers a server's transmission capacity,
causing a congested road traffic that keeps ordinary TCP sessions from traversing – henceforth
the expression "refusal of administration" (Bridy, 2017).
DDoS moderation is intended to retain the blow of this sort of DNS assault. For the most part,
that implies steering the traffic through a traffic sifting administration that has enough
transmission capacity to deal with the heap and can strip out the assault traffic, sending the
typical traffic through to the objective server. Consistency measures, for example, NIST 800-53
give fundamental direction on building systems to adapt to DDoS assaults; further developed
reactions as a rule include obtaining DDoS-explicit administrations which give extra limit in case
of an assault (Kurtzman, 2016) .
DNS
Where should DNS servers reside?
Normally, each organization with a server farm has its very own DNS. In this way, most of them
are inside organizations. This kind of DNS settle inside name (like . nearby) and names of
inward servers distributed over the Internet.
Another critical part of DNS server is within facilitating server farms. These are organizations
that host sites or applications,so they have a great deal of servers distributed over the Internet.
Thus, they are probably going to have their very own DNS (Shehzad, 2019).
At long last, we have root DNS servers that thinks pretty much the various legitimate DNS
servers. They are facilitated in server farms like some other server, yet in addition stored inside
the ISP system to decrease the measure of traffic to different ISPs so as to come to the "first"
root DNS (Vinayakumar et al., 2018).
What kind of DNS security can the DNS servers leverage?
DDoS
The main sort of DNS security is conveyed because of an unmistakable kind of risk:
disseminated refusal of administration assaults, or DDoS. In a DDoS assault, a server is
immersed with DNS reactions, regularly produced by bots or malware from captured PCs around
the globe utilizing a ridiculed source address, the location of the objective, and reflected off of
open DNS servers. This tsunami of DNS reactions overpowers a server's transmission capacity,
causing a congested road traffic that keeps ordinary TCP sessions from traversing – henceforth
the expression "refusal of administration" (Bridy, 2017).
DDoS moderation is intended to retain the blow of this sort of DNS assault. For the most part,
that implies steering the traffic through a traffic sifting administration that has enough
transmission capacity to deal with the heap and can strip out the assault traffic, sending the
typical traffic through to the objective server. Consistency measures, for example, NIST 800-53
give fundamental direction on building systems to adapt to DDoS assaults; further developed
reactions as a rule include obtaining DDoS-explicit administrations which give extra limit in case
of an assault (Kurtzman, 2016) .
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Firewalls
DNS firewalls are the second sort of DNS security. Where DDoS relief managed quantitative
dangers (an excessive number of DNS reactions), DNS firewalls manage subjective dangers.
More or less, DNS firewalls apply security arrangements to questions, settling on a choice about
whether each inquiry ought to be permitted to determine or not.
On the off chance that the inquiry meets a characterized risk profile, a DNS firewall (as a rule
sent on the system limit to catch outbound traffic) will hinder the question and react back with a
"NXdomain" to the mentioning customer. In increasingly advanced frameworks, the DNS
inquiry can be diverted "sinkholed" into a security domain where the mentioned name and source
PC can be logged for remediation steps. (Chandramouli & Rose, 2010)
Risk insight
Risk insight, the third sort of DNS security, takes DNS firewalls to the following level. Where
DNS firewalls apply cover type insurances to inquiry types or different properties, danger insight
takes a curated feed of referred to pernicious areas and applies it as a security approach through a
DNS firewall. Normally these feeds are bought from outsider merchants and just "connected" to
existing DNS firewalls, however it is likewise feasible for clients to make their own adaptations
of danger knowledge sustains which modify arrangements for explicit security use cases (Wang,
Chen, & Zhu, 2017).
DHCP
Will a form of DHCP fault tolerance be implemented?
DHCP selection criteria to the efficient operations of the whole network as it forms the core
piece that issue the various nodes with IP configurations. For this network, the DHCP relay agent
shall be used where messages gets broadcasted into the network and only those nodes that are
within the network shall receive the messages relayed. This method is critical since it supports
better IP management due to its centralised management. Again, it can be configured for remote
clients in the companies domain and scales when with the network growth
Hyper-V
As virtualized conditions become more prominent and powerfully fanciful, in any case, IT
divisions need uncommon association programming to fix them and keep alert with the latest. It's
altogether less hard to make another VM than it is to set up another physical server, so
virtualized conditions, as it were, experience the insidious effects of the formation of such a huge
number of VMs, a marvel known as VM spread (Apolinário, 2015).
DNS firewalls are the second sort of DNS security. Where DDoS relief managed quantitative
dangers (an excessive number of DNS reactions), DNS firewalls manage subjective dangers.
More or less, DNS firewalls apply security arrangements to questions, settling on a choice about
whether each inquiry ought to be permitted to determine or not.
On the off chance that the inquiry meets a characterized risk profile, a DNS firewall (as a rule
sent on the system limit to catch outbound traffic) will hinder the question and react back with a
"NXdomain" to the mentioning customer. In increasingly advanced frameworks, the DNS
inquiry can be diverted "sinkholed" into a security domain where the mentioned name and source
PC can be logged for remediation steps. (Chandramouli & Rose, 2010)
Risk insight
Risk insight, the third sort of DNS security, takes DNS firewalls to the following level. Where
DNS firewalls apply cover type insurances to inquiry types or different properties, danger insight
takes a curated feed of referred to pernicious areas and applies it as a security approach through a
DNS firewall. Normally these feeds are bought from outsider merchants and just "connected" to
existing DNS firewalls, however it is likewise feasible for clients to make their own adaptations
of danger knowledge sustains which modify arrangements for explicit security use cases (Wang,
Chen, & Zhu, 2017).
DHCP
Will a form of DHCP fault tolerance be implemented?
DHCP selection criteria to the efficient operations of the whole network as it forms the core
piece that issue the various nodes with IP configurations. For this network, the DHCP relay agent
shall be used where messages gets broadcasted into the network and only those nodes that are
within the network shall receive the messages relayed. This method is critical since it supports
better IP management due to its centralised management. Again, it can be configured for remote
clients in the companies domain and scales when with the network growth
Hyper-V
As virtualized conditions become more prominent and powerfully fanciful, in any case, IT
divisions need uncommon association programming to fix them and keep alert with the latest. It's
altogether less hard to make another VM than it is to set up another physical server, so
virtualized conditions, as it were, experience the insidious effects of the formation of such a huge
number of VMs, a marvel known as VM spread (Apolinário, 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Hyper-V goes with key association programming, in any case additionally made structures may
require the Microsoft System Center Virtual Machine Manager. Hyper-V's default the board
programming has about 33% of the highlights that the Virtual Machine Manager does, Morimoto
said. Virtual Machine Manager can enable you to oversee different VMs, making it less
perplexing to begin and stop virtual servers as critical and apply patches. It in like way has
weight changing highlights, Morimoto said (Kanimozhi and Jacob, 2019, p. 20).
Despite whether your customer utilizes virtualized servers or not, security is ceaselessly a huge
worry in the server farm. In the last section of our Hotspot Tutorial on Windows Server 2008,
we'll take a gander at a touch of its new security highlights and how you can utilize them to
watch your customer's information.
What features of Hyper-V can Kris Corporation leverage?
Limit Replica
Point of confinement Replica is precisely a noteworthy flash for it; Storage Replication is a
Volume replication (at the square level) and synchronous between Servers or Clusters. Tallying
this debacle recuperation include, Microsoft again went further to give a significantly
progressively High Availability to Hyper-V (Evans, 2015).
Ensured Virtual Machines
Shield VM include (Virtual Trusted Platform Module) was one of the highlights that Microsoft
made to give more VMs security utilizing BitLocker headway and to ensure against ransomware
and different ambushes. Counting any review, burglary, and altering of affiliation information
from administrators (Krzysztof Rzecki, Michał Niedźwiecki, Tomasz Sośnicki, and Andrzej
Martyna, 2014).
Routing/Security
Document Transfer Protocol (FTP Programs)
In spite of the fact that an old one, FTP is as yet a valuable technique for sharing records on the
Internet. It works by making accessible every one of the documents that should be shared on a
FTP server. Remote PCs that need to get to those mutual documents run FTP customer
programming and sign in to the server
require the Microsoft System Center Virtual Machine Manager. Hyper-V's default the board
programming has about 33% of the highlights that the Virtual Machine Manager does, Morimoto
said. Virtual Machine Manager can enable you to oversee different VMs, making it less
perplexing to begin and stop virtual servers as critical and apply patches. It in like way has
weight changing highlights, Morimoto said (Kanimozhi and Jacob, 2019, p. 20).
Despite whether your customer utilizes virtualized servers or not, security is ceaselessly a huge
worry in the server farm. In the last section of our Hotspot Tutorial on Windows Server 2008,
we'll take a gander at a touch of its new security highlights and how you can utilize them to
watch your customer's information.
What features of Hyper-V can Kris Corporation leverage?
Limit Replica
Point of confinement Replica is precisely a noteworthy flash for it; Storage Replication is a
Volume replication (at the square level) and synchronous between Servers or Clusters. Tallying
this debacle recuperation include, Microsoft again went further to give a significantly
progressively High Availability to Hyper-V (Evans, 2015).
Ensured Virtual Machines
Shield VM include (Virtual Trusted Platform Module) was one of the highlights that Microsoft
made to give more VMs security utilizing BitLocker headway and to ensure against ransomware
and different ambushes. Counting any review, burglary, and altering of affiliation information
from administrators (Krzysztof Rzecki, Michał Niedźwiecki, Tomasz Sośnicki, and Andrzej
Martyna, 2014).
Routing/Security
Document Transfer Protocol (FTP Programs)
In spite of the fact that an old one, FTP is as yet a valuable technique for sharing records on the
Internet. It works by making accessible every one of the documents that should be shared on a
FTP server. Remote PCs that need to get to those mutual documents run FTP customer
programming and sign in to the server

Shared Networks
Distributed (P2P) document sharing is one of the most prominent strategies for record sharing,
especially for music and recordings. Documents are imparted to the assistance of distributed
programming and clients can straightforwardly get to and download the records.
References
Apolinário, V. R., author. (2015). Learning Hyper-V: Learn how to design, deploy, configure, and
manage virtualization infrastructure using Hyper-V.
Bridy, A. (2017). Notice and Takedown in the Domain Name System: ICANN's the Ambivalent
Drift into Online Content Regulation. Washington and Lee Law Review, (Issue 3), 1345.
Chandramouli, R., & Rose, S. (2010). Secure Domain Name System (DNS) deployment guide
[electronic resource]: Recommendations of the National Institute of Standards and
Distributed (P2P) document sharing is one of the most prominent strategies for record sharing,
especially for music and recordings. Documents are imparted to the assistance of distributed
programming and clients can straightforwardly get to and download the records.
References
Apolinário, V. R., author. (2015). Learning Hyper-V: Learn how to design, deploy, configure, and
manage virtualization infrastructure using Hyper-V.
Bridy, A. (2017). Notice and Takedown in the Domain Name System: ICANN's the Ambivalent
Drift into Online Content Regulation. Washington and Lee Law Review, (Issue 3), 1345.
Chandramouli, R., & Rose, S. (2010). Secure Domain Name System (DNS) deployment guide
[electronic resource]: Recommendations of the National Institute of Standards and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Technology / Ramaswamy Chandramouli, Scott Rose. Gaithersburg, MD : U.S. Dept. of
Commerce, National Institute of Standards and Technology, 2010.
Evans, C. (2015). Virtualisation and disaster recovery: DR features in Hyper-V. Computer
Weekly, 24–27.
Issac, B. (2014). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
Kanimozhi, V., & Jacob, T. P. (2019). Artificial Intelligence based Network Intrusion Detection
with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-
IDS2018 using cloud computing. ICT Express, 5(3), 211–214.
https://doi.org/10.1016/j.icte.2019.03.003
Krzysztof Rzecki, Michał Niedźwiecki, Tomasz Sośnicki, & Andrzej Martyna. (2014).
Experimental Verification Of Hyper-V Performance Isolation Level. Computer Science,
(2), 159. https://doi.org/10.7494/csci.2014.15.2.159
Kurtzman, T. (2016). Continued Hijacking and Ransoming of the Domain Name System by
Modern-Day Corporate Privateers, The. Business Law Today, (Issue 6), 1.
Lucas Trombeta, & Nunzio Marco Torrisi. (2019). DHCP Hierarchical Failover (DHCP-HF)
Servers over a VPN Interconnected Campus. Big Data and Cognitive Computing, (1),
18. hgy based on improved wavelet analysis method. RISTI (Revista Iberica de
Sistemas e Tecnologias de Informacao), (E9), 294.
Zhicai Shi, Xiaomei Zhang, & Yihan Wang. (2017). A Lightweight RFID Grouping-Proof Protocol
Based on Parallel Mode and DHCP Mechanism. Information, (3), 85.
https://doi.org/10.3390/info8030085ttps://doi.org/10.3390/bdcc3010018
Melber, D. (2011). Windows Audit Update Using LDP to Enumerate Active Directory
Information. INTERNAL AUDITING -BOSTON- WARREN GORHAM AND LAMONT
INCORPORATED-, (6), 40.
Melber, D. (2014). Continuous Auditing of Active Directory ... Redefined! INTERNAL AUDITING
-BOSTON- WARREN GORHAM AND LAMONT INCORPORATED-, (3), 40.
Commerce, National Institute of Standards and Technology, 2010.
Evans, C. (2015). Virtualisation and disaster recovery: DR features in Hyper-V. Computer
Weekly, 24–27.
Issac, B. (2014). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
Kanimozhi, V., & Jacob, T. P. (2019). Artificial Intelligence based Network Intrusion Detection
with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-
IDS2018 using cloud computing. ICT Express, 5(3), 211–214.
https://doi.org/10.1016/j.icte.2019.03.003
Krzysztof Rzecki, Michał Niedźwiecki, Tomasz Sośnicki, & Andrzej Martyna. (2014).
Experimental Verification Of Hyper-V Performance Isolation Level. Computer Science,
(2), 159. https://doi.org/10.7494/csci.2014.15.2.159
Kurtzman, T. (2016). Continued Hijacking and Ransoming of the Domain Name System by
Modern-Day Corporate Privateers, The. Business Law Today, (Issue 6), 1.
Lucas Trombeta, & Nunzio Marco Torrisi. (2019). DHCP Hierarchical Failover (DHCP-HF)
Servers over a VPN Interconnected Campus. Big Data and Cognitive Computing, (1),
18. hgy based on improved wavelet analysis method. RISTI (Revista Iberica de
Sistemas e Tecnologias de Informacao), (E9), 294.
Zhicai Shi, Xiaomei Zhang, & Yihan Wang. (2017). A Lightweight RFID Grouping-Proof Protocol
Based on Parallel Mode and DHCP Mechanism. Information, (3), 85.
https://doi.org/10.3390/info8030085ttps://doi.org/10.3390/bdcc3010018
Melber, D. (2011). Windows Audit Update Using LDP to Enumerate Active Directory
Information. INTERNAL AUDITING -BOSTON- WARREN GORHAM AND LAMONT
INCORPORATED-, (6), 40.
Melber, D. (2014). Continuous Auditing of Active Directory ... Redefined! INTERNAL AUDITING
-BOSTON- WARREN GORHAM AND LAMONT INCORPORATED-, (3), 40.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

PR Newswire. (2019). SpyCloud Active Directory Guardian Automates Password Security.
SPY-CLOUD-Passwords. Retrieved from http://165.193.178.96/login?url=http%3a%2f
%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN
%3d201909170800PR.NEWS.USPR.LA74478%26site%3deds-live
Preimesberger, C. (2016). 10 Ways Administrators Can Harden Active Directory Security.
EWeek, 1–1.
Preimesberger, C. (2019). Quest Launches Recovery Manager for Active Directory. EWeek,
N.PAG-N.PAG.
Shehzad, K. (2019). Defence against Denial of Service (DoS) attacks using Identifier-Locator
Network Protocol (ILNP) and Domain Name System (DNS).
Vinayakumar, R., Soman, K. p., Poornachandran, P., Thampi, El-Alfy, Mitra, & Trajkovic. (2018).
Detecting malicious domain names using deep learning approaches at scale. Journal of
Intelligent & Fuzzy Systems, 34(3), 1355–1367. https://doi.org/10.3233/JIFS-169431
Wang, K., Chen, X., & Zhu, Y. (2017). Random domain name and address mutation (RDAM) for
thwarting reconnaissance attacks. PLoS ONE, 12(5), 1–22.
https://doi.org/10.1371/journal.pone.0177111
Wu, K., Li, Y., Chen, L., & An, S. (2016). Research of DHCP flooding attack detection
technology
SPY-CLOUD-Passwords. Retrieved from http://165.193.178.96/login?url=http%3a%2f
%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN
%3d201909170800PR.NEWS.USPR.LA74478%26site%3deds-live
Preimesberger, C. (2016). 10 Ways Administrators Can Harden Active Directory Security.
EWeek, 1–1.
Preimesberger, C. (2019). Quest Launches Recovery Manager for Active Directory. EWeek,
N.PAG-N.PAG.
Shehzad, K. (2019). Defence against Denial of Service (DoS) attacks using Identifier-Locator
Network Protocol (ILNP) and Domain Name System (DNS).
Vinayakumar, R., Soman, K. p., Poornachandran, P., Thampi, El-Alfy, Mitra, & Trajkovic. (2018).
Detecting malicious domain names using deep learning approaches at scale. Journal of
Intelligent & Fuzzy Systems, 34(3), 1355–1367. https://doi.org/10.3233/JIFS-169431
Wang, K., Chen, X., & Zhu, Y. (2017). Random domain name and address mutation (RDAM) for
thwarting reconnaissance attacks. PLoS ONE, 12(5), 1–22.
https://doi.org/10.1371/journal.pone.0177111
Wu, K., Li, Y., Chen, L., & An, S. (2016). Research of DHCP flooding attack detection
technology
1 out of 8

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.