Detailed Analysis of Security Attacks and Attackers in Cybersecurity

Verified

Added on  2023/03/21

|7
|1477
|27
Homework Assignment
AI Summary
This assignment analyzes two types of security attacks: Distributed Denial of Service (DDoS) and identity theft. The scenario describes a situation where a website experiences a surge in login requests, indicating a potential DDoS attack, and discusses the importance of identifying and preventing such attacks. It also covers identity theft, emphasizing the impact on confidentiality and the theft of personal information. The analysis includes determining network traffic related to the attacks, assessing their impact on confidentiality, integrity, and availability, and identifying the motivations behind the attacks, such as financial gain. The assignment then explores countermeasures for both DDoS attacks, including identifying attacks early, and identity theft, such as monitoring credit reports and avoiding sharing personal information. The assignment references several sources including books and research papers to support the findings.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SECURITY ATTACK AND ATTACKERS
Security Attack and Attackers
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Scenario Description........................................................................................................................3
Determination of network traffic for the attack...............................................................................3
Type of Attack and Impact..............................................................................................................4
Motivation of Attack........................................................................................................................5
Countermeasures..............................................................................................................................5
References........................................................................................................................................7
Document Page
Scenario Description
The overall development of technology has touched the various zones of life. Along with
these, it has opened up new doors where data can be stolen in the present scenario. It is mainly
done for the criminals who want huge amount of financial gains (Stallings, 2017). In some of the
cases, it is seen that victims become very much unaware of overall risk and effect of cyber-
attack.
Denial of Services: In the given scene, hackers tend to disrupt the overall services which
are being given to the user. The scenario that is being described is that 200 users who intend to
login into the system for making use of the website (Laet & Schauwers, 2005). Just on a single
day, security team has noticed the point that in between the time 9 am to 10 am the total number
of login request has exceeded the value of 1000. This particular action result in suspicion activity
where the following step is all about identifying the attempts is successful or not.
Identifying the theft: Identification of theft is known to be as one of the harmful areas for
cyber-attack. If anyhow the attacker gets the information, then collected information can be used
for creating digital footprint that can result in the instance of cyber investigation Stallings, 2017).
This particular information can be used by criminals who make use of it at the instance of
cybercrime.
Determination of network traffic for the attack
Distributed Denial of Services (DDoS) can be stated as a malicious way which is needed
of disrupting normal traffic in the given target server. DDoS attack tends to work by making use
of black hole routing (Laet & Schauwers, 2005). As soon as the given solution is available on the
given virtual network, a black is created which is needed for routing both tunnel and traffic in the
Document Page
route. Black hole filter is mainly implemented without any kind of restriction which can be used
by both legitimate and malicious network. It is mainly routed and dropped completely from the
given network. At the time of DDoS attack, Internet service provider can easily site the given
traffic like a black hole similar to a defence.
There has been evidence of network traffic monitoring that has been discovered in the
last few years. For various organization, regular monitoring of traffic is considered to be a vital
aspect (Yan & Yu, 2015). The point can be considered that two-factor authentication to customer
is considered to be an important aspect. It is mainly needed for analysing the overall login
attempts for getting access to respective account.
Type of Attack and Impact
Distributed Denial of Service (DDoS) mainly tends to affect the confidentiality of the
user. It mainly prevents the user from getting easy access to devices and network information as
a result of malicious cyber threat attackers. This particular attack mainly tends to affect the
various aspect of user like email, website and lastly online accounts. It merely tends to affect
some other kind of services which rely on the given system and network (Rasti et al., 2015).
Denial of services mainly tends to work by making use of flooding of given network until and
unless target cannot respond. It is all about preventing access to the legitimate user. DDoS attack
can easily result in huge amount of cost to the given organization in terms of cost and money.
In identity theft attack, the overall effect is obtained on the piece of personal information.
Identity theft is mainly being of two types that is true name and takeover of attack. The true
name is used for collecting information by making use of personal information that is needed for
opening up new account (Dolk et al., 2017). Account takeover aims to look for data by making
use of personal information; it is mainly needed for having access to the personal account.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Identity theft mainly tends to impact on the imposter by making use of personal information
which is needed for gaining access to the account. In most of the cases, the thief aims to make
changes in the mailing address.
Motivation of Attack
In identity theft attack, the main focus is on the key pieces of personally identifiable
information like licence number of diver. In this attack, the required information is mainly
needed for collecting all the required information which is needed for collecting required details
of credit card (Hui, Kim & Wang, 2017). The overall theft can easily result in opening up credit
card information like establishment of new checking account which is needed for obtaining
blank checks. In the instance of identity theft, account take-over focus on imposter of use of
personal information which is needed for gaining access to personal accounts.
DDoS attack is relatively inexpensive which has huge amount of impact on the business.
In most general cases, DDoS attack can easily last on the given single day which is bought to
around 500 dollars on the web platform (De Persis & Tesi, 2015). It can result in huge amount of
financial cost where unavailability of service can damage the overall reputation of the given
organization. With time, DDoS attacktends to become ten times bigger as server were used along
with system.
Countermeasures
Identity theft: There is large number of ways which can used for preventing identity theft
like user are suggested to make individual check on the given credit card reports. The mere
attention is paid to the billing cycle along with following up of credit card bills do not arrive in
given time (Kandoi & Antikainen, 2015). Also, people need to destroy the application of credit
Document Page
card along with looking for any kind of unauthorized transaction on the given element (Hui, Kim
& Wang, 2017). User should not provide any kind of personal information concerning any kind
of unsolicited mail.
DDoS attack: User needs to take up six steps for preventing DDoS attack like
Identifying the attack on the beginning stage.
Bandwidth provision
Defending the network parameter
Making a call to ISP provider.
Making a call to the specialist of DDoS mitigation.
Document Page
References
De Persis, C., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service. IEEE
Transactions on Automatic Control, 60(11), 2930-2944.
Dolk, V. S., Tesi, P., De Persis, C., & Heemels, W. P. M. H. (2017). Event-triggered control
systems under denial-of-service attacks. IEEE Transactions on Control of Network
Systems, 4(1), 93-105.
Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international
legislation: Evidence from distributed denial of service attacks. Mis Quarterly, 41(2),
497.
Kandoi, R., & Antikainen, M. (2015, May). Denial-of-service attacks in OpenFlow SDN
networks. In 2015 IFIP/IEEE International Symposium on Integrated Network
Management (IM) (pp. 1322-1326). IEEE.
Laet, G., & Schauwers, G. (2005). Network security fundamentals. Indianapolis, Ind.: Cisco
Rasti, R., Murthy, M., Weaver, N., & Paxson, V. (2015, May). Temporal lensing and its
application in pulsing denial-of-service attacks. In 2015 IEEE Symposium on Security
and Privacy (pp. 187-198). IEEE.
Stallings, W. (2017). Cryptography and Network Security. Harlow, United Kingdom: Pearson
Education Limited.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]