This thesis artefact is flexible

Assignment Help Basic Computer Science
Reference no: EM13141237

Thesis artefact 

The Aim of this assessment is to come up with an effective and new detection method against botnet DDoS (Distributed Denial of Service) type of attack by doing a testbed. 

The objectives to achieve this aim: 
Use Harvard referencing 

This thesis artefact is flexible in a sense that helper can use any other sort of tools to accomplish the task as long as it matches with the aim but please, let me know how he/ she going to do it. 

We can use Virtualbox or any other software that allow us to accomplish the following objectives 

1) Using linux server that is running SNORT IDS that does network packet monitoring. The SNORT should basically do the job of packet monitoring such as UDP, HTTP, and Port and outputting the captured packet logs into human readable language (maybe mysql, ossim or any other convenient software) 

2) Using another server that can be any like window XP or linux that is acting as botnet (any botnet as long as it is not older than 4 years) that lunches a DDoS attack to linux server. 

The Linux server that is running SNORT should be configured with customized new and unique rules (perhaps 2 or 3 rules) that should show how effective it is to detect the botnet based DDoS bandwidth attacks. 

The SNORT should send alerting messages to linux server in the form of e-mail message whenever there is possible Botnet Based DDoS attack. The e-mail alert messages should be triggered based on the customized new and unique rules (perhaps 2 or 3 rules). These customized new and unique rules are configured to for botnet ddos based attack detection. 

We need to write short introduction about this artefact 

Short description of tools that is used to produce this thesis report 

Providing screen shots into the body of the report if it is relevant to put (screen shots can be such as alerting e-mail messages, network packet picture under normal function and under botnet based ddos attack. 

We need to present the report showing how the new and customized snort rule is effective to detect botnet based ddos attack in comparison to snort normally configured rule. 

We need to do screen shots of SNORT installation and other tool's command that are used to produce this thesis artefact in appendix. 

When customizing SNORT new and unique rule - it should be easy to understand for normal users. All the explanation on what each element used in SNORT'S new and unique rule should be explained. The header and body of the new and customized SNORT rule should contain type of botnet ddos it detects, time and any other relevant information. 

Analysis of the snort detection result 

In conclusion, we can provide analytical discussion about what type of botnet ddos the new snort rule is able to detect and what are the strengths and limitation of this new snort rules are in comparison to any other tools that detects the botnet based ddos attack.

Reference no: EM13141237

Questions Cloud

Define a sinusoidal voltage has a maximum value : A sinusoidal voltage has a maximum value of 100V, and the value is 10V at t=0. The period is T=1ms. Determine v(t)
Stock repurchase announcement : If management estimates that a stock repurchase announcement will increase stock price by 5 percent, how many shares should they be prepared to repurchase?
What is the partial pressure of argon in the flask : A 1 L flask is filled with 1.45 g of argon at 25  C}. A sample of ethane vapor is added to the same flask until the total pressure is 1.25 atm.what is the partial pressure of argon in the flask?
Determine the capacitance required in a half wave : Determine the capacitance required in a half wave rectifier to produce a ripple voltage less than 0.2V. Assume that the input is a 60Hz signal with maximum voltage VM=100V
This thesis artefact is flexible : This thesis artefact is flexible in a sense that helper can use any other sort of tools to accomplish the task as long as it matches with the aim but please, let me know how he/ she going to do it.
What is the partial pressure of the co2 : If carbon dioxide gas is collected over water at 25C and 775 torr, what is the partial pressure of the CO2? The vapor pressure of water is 23.8 torr at 25C.
Activity-based cost management problem : Activity-based cost management (ABM) can best be defined as:
Explain an electric heating element is connected : An electric heating element is connected to a 110 v circuit and a current of 3.2 A is flowing through the element. How much energy is used up during a period
Value-added for a merchandise company : Which of the following activities is most likely to be classified as value-added for a merchandise company?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How to strive to nurture place which holds learning

What type of organization permits you to be creative, risk prone, and good conversationalist with peers? How can you strive to nurture place which embraces learning?

  Change arp entry in computer for mac address

Print your ARP cache table. Find a server on your local network. Change its ARP entry in your computer to point to your computer's MAC address. Print new ARP cache table. Now use the service and see what happens.

  Advantages and disadvantages of asymmetric or symmetric key

The Institute has collaborated with XYZ inc. for research on genetics. Information should be kept top secret at any cost. At ABC Institute, researchers are not sure about kind of key.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

  Explain worst possible reports from system

Imagine worst possible reports from a system. What is wrong with them? Write as many problems as you can. What are the consequences of such reports?

  Write challenges with requirement elicitation

What is meant by "enterprise-wide analytics technology," and how can it play part in understanding business processes? Write down the challenges related with "requirement elicitation"

  Steps to follow to verify local police department-s findings

Your computer investigation firm has been hired to verify the local police department's findings on a current case. What do you need to ask the police investigator for, and what procedures should you follow?

  Question about compiler theory

Determine some common compilers available? Based on regular expressions, can all input be validated if it is correct, or not, based on compilation?

  Explaining logical knowledge base represents the world

A logical knowledge base represents the world using a set of sentences with no explicit structure. Analogical representation, on the other hand, has physical structure that corresponds.

  Implementing strong password policy

How do you implement strong password policy given dilema of forgotten passwords? How would you address these issues?

  Responsibility to maintain ethical standard in department

Do managers have a responsibility to maintain an ethical standard within a department? If so, how is the expected ethical standard established? How is it documented? How is compliance measured?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd