Description
Rules:
Should use given template below(Make sure to use the enclosed template.)
APA Format
No Plagiarism
Should have minimum of 7 References
Need PPT minimum of 10 slides using the research paper
Research paper should have these sections(Mandatory): can add more sections depending on the research paper
* abstract
* introduction
* what is DDos
* example of recent attacks
* counter measures
* 12 pages content without images
no need of images
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Work done
Running head: DDOS RESEARCH
1
DDos Research
Student Name
Name of Institution
Course
2
DDOS RESEARCH
DDos Research
Abstract
Internet security, computer threats, and cyber-crimes constitute a significant scene with
the current technology; despite innovation being such a big game changer, it has come with it
carrying aspects that are tending to dwarf the system operations. In this research paper, I shall
provide an overview of what Distributed Denial of Service (DDoS) is, and what it does to
compromise systems. An example of the commonly used DDoS attack is the UDP Flood type,
and the UDP flood is characterized to flood a target system with User Datagram Protocol (UDP)
packets, for instance, the HTTP Flood is familiar to us, Ping of Death and Slowloris are other
examples. The DDoS attack to draw a slow functioning of the target service.
The paper shows how the DDoS slows or even makes it impossible for services to be
delivered by generating wantonly malicious traffics into the target group. The methods it
employs to cripple a system are discussed in the paper at an extensive length; the approaches to
counter-attack the DDoS inversion which perfectly work are, Lighting-Fast Global DNS, Web
Application Firewall, Enterprise-Class Security, and SSL Encryption. With these protective
measures, a system is bound not to be under risk of attack as they help detect any incoming
DDoS attack and send signals before it can corrupt the system. It is healthy to note that criminal
perpetrators using the DDoS are often ready to target high profiled institutions with classified
data such as banks and credit card payment gateways. I would recommend the installation of the
applications that deter these masked faces from compromising our systems be deployed. This
criminal gesture needs to be curbed and eroded at all cost.
3
DDOS RESEARCH
Introduction
The DDoS attack was discovered thirty years ago. After the establishment of the first
DDoS, all countries have been able to witness various modifications which share the same
results of disrupting the accessibility of aimed congregation and services. Besides, there has been
a related advancement in DDoS security technologies and improvement to enhance the antiDDoS relate with the new technology. In 1988 Morris created a self-replicating CPU package;
the program had a significant effect on the internet. He used Trojan computer program which
was identified as it was spreading. The recognition was noticed due to the frequency at which it
utilized the system programs. Morris is not credited with the introduction of the attacks by either
controlling his computers in a centralized way. However, his work has molded the foundation for
the DDoS attacks by using botnets (Eugene, 2016).
The most common methods of DDoS attacks used was done by injecting Trojan virus
using structured vulnerabilities and initiation attacks against the objective using botnets.
Nevertheless, the actual DDoS attack was conducted in 1996 which is referred to as the pinax
attack. The attack affected many business institution programs and caused massive losses. In
addition, some SYN packages were used to make the server inactive for the user’s standard
suggestions. Nonetheless, affected companies were later able to utilize filters on their programs
to prevent the attack traffic. Linux patch presented the idea of SYN cookie defense for SYN
massive attacks. In 2000, Yahoo and Amazon experienced an attack in the US. The internet alias
by Michael utilized an attack tool TFN2 to introduce the distribution attacks to protect all
marketable websites by attempting to governor the internet. The TFN2 presentations attacks
4
DDOS RESEARCH
were distributed using botnets which preserved the encryption of communication ideas to
counter-attack detection.
Since 2001, governments and nations have been targeted by their opponents. In 2009,
American government website, which is inclusive of the white house and department forces, was
suffering from the same attacks of botnets. The attack was made by telecom branch of North
Korea which affected twenty-seven government websites. Other organizations which
experienced attacks during the same period include the Facebook, Twitter, and YouTube which
was caused by the Russian.
The DDoS attack is made by making computer programs and resource inactive to the
intended users by affecting the services of a host which is connected to the internet. The
disruption is done by flooding the aimed computer with all the requests, with an attempt to
overwork the system and avert all pri...