Investigate the botnet attack modules

Assignment Help Computer Networking
Reference no: EM132206066

Assessment - Evaluation of Botnet Attacks and its Mitigation Methods

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to analyse the botnet attacks in cybersecurity; evaluate available defensive resolutions, and recommend a security solution.

Students will be able to complete the following ULOs:
a. Analyse cyber security threats and attacks
b. Implement and evaluate security testing tools in a realistic computing environment

Assignment 1: Evaluation of Botnet Attacks and its Mitigation Methods

Assignment Description

Internet of Things (IoT), equipped with massively interconnected Cyber-Physical Devices (CPDs) is opening a new era of ubiquitous computing and smart communications. The IoT is expected to create many new business opportunities in smart home care, industry automation, and critical infrastructure protection.

To enable the prevalent IoT services, many of the small computing devices, which were considered unworthy and unintelligent, have been reformatted and given the cyber-communication capacity. This has enabled many smart applications, but on the other hand, it has created serious security problems as these devices are not properly configured for security. These CPDs are inherently lack the computing resources (CPU processing or computer memory); therefore, they are open to many serious attacks including hijacking attacks which will dupe them to be part of BOTNET attacks.

1624_figure.jpg

Figure 1: Example of Botnet Attack

The BOTNET attack is a serious problem in Cyber Security.

In this report, you are to investigate:
1. The Botnet attack modules/structures
2. Botnet attack types and their implications to the victim services
3. Evaluation of protective technologies
4. Recommendation of protective resolution
5. Conclusion and remarks on future works.

Your group report should include the following sections and subsections:

1. Introduction to botnet attack and a simple case example addressing the significance of this report.
2. The Botnet attack modules/structures
a. Modules
i. The attacker or master
ii. Handler
iii. Agents
iv. Victims
b. Botnet attack life cycle
i. Initial infection
ii. Secondary infection
iii. Connection or rally
iv. Malicious activities
v. Maintenance and upgrading
3. Botnet attack types and their implications to the victim services
a. Select at least three examples from the list1.
b. Evaluate their attack implication to the potential victim services
4. Recommendation of your choice of the mitigation solution
5. Conclusion and remarks on future works

Verified Expert

The task deals with security issues in Botnet. The type of attacks are described. The life cycle of botnet has been discussed. In addition, technologies and measures to prevent botnet attacks are explained in the paper with conclusion, future work and recommendations.

Reference no: EM132206066

Questions Cloud

Compute the solution to the system of equations : The requirement of b as a column vector seems a bit excessive as both row and column vectors are just 1D arrays as far as Matlab is concerned.
Access the data type is called autonumber : In access the data type is called "AutoNumber" in SQLServer it is called an identity field, Oracle is it called a "sequence". What do they do?
Write a matlab program in which you can enter : Write a Matlab program in which you can enter the studentID's of students and then the marks obtained by eac student out of 100.
Write a matlab function that computes precision : Write out the precision, and the base, along with the ratio of precision and base, in other words writeout base, precision and precision/base.
Investigate the botnet attack modules : create many new business opportunities in smart home care, industry automation, and critical infrastructure protection - Evaluation of Botnet Attacks
Write a method that accepts a minimum integer : Write a method that accepts a minimum integer and a maximum and prints a square line of increasing numbers.
Return the range of values in an array of integers : Write a method called range that returns the range of values in an array of integers.
Write a method called reminder that takes an integer : Write method distance to calculate the distance between two points (x1, y1) and (x2, y2). All numbers and return values should be of type double.
Write a method that will create and return the reference : Write a method that will create and return the reference of a 2D array containing the elements in transposed order of another 2D array passed as an argument.

Reviews

Write a Review

Computer Networking Questions & Answers

  Define the overall network architecture

Write a 3- to 5-page paper that includes the following based on your chosen Virtual Organization: Explain the importance of communication protocols. Define the overall network architecture

  What are the advantages of the osi reference model

Describe the functionality at each of the seven layers of the OSI model

  How they are used to construct cloud computing solutions

Describe cloud technologies and how they are used to construct cloud computing solutions - Describe how cloud computing is used to solve computing problems

  Prepare a 5-7 slide presentation on the network types you

create a 5-7 slide presentation on the network types. you may use various sources including your textbook. be sure to

  Create a map of your company or schools local area network

Create a map of your company or school's local area network. Are there any hubs? Where are the hubs located? Are there any switches?

  Function of the nic in data transfer

1. Compare the pros and cons of CAT 6 UTP cable and Fiber Optic MM Cable. 2. Discuss the function of the NIC in data transfer on a LAN and the NIC's role in C

  What is an intrusion prevention system

What techniques can be used to reduce the chance that social engineering will be successful? - What is an intrusion prevention system?

  Design of country kitchen classics web user interface

Specify Use cases for the design of Country Kitchen Classics Web User Interface specifying the actors. Provide possible scenarios for each Use case.

  Why are timestamps used in the kerberos protocolnbsp assume

why are timestamps used in the kerberos protocol?nbsp assume that alice shares a secret s with her companys server

  What is the null and alternative hypothesis

Find the chi-square statistic.

  How third-party plug-ins change process of diagnosing errors

How does third-party plug-ins change process of diagnosing and troubleshooting errors within application? What steps would you take in diagnosing the application which has been changed from its original state?

  Determine time to transmit text over a t-1 line

Be sure to allow for spaces and punctuation between words. How long would it take to transmit the text over a T-1 line at 1.544Mbps and a fibre optic link at 2.488Gbps?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd