Is the proposed technique a promising

Assignment Help Basic Computer Science
Reference no: EM13922322

Individual Assignment #1

Description

The task of this individual assignment is to write a research paper/report.

Topic of the Paper:

Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks.

Assignment Guidelines

The following must be considered when you write the report:

Select 3-4 research papers (in addition to those provided/suggested) which discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:

The research papers must be published by a peer reviewed journal or be published in conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.).

You must not choose papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.).

Briefly explain your rationale for selecting a specific research paper.

Summarize each research paper and identify a combined total of three different detection, mitigation, or prevention techniques described in EACH of the papers you selected. For example: you can have a) one detection + two prevention methods, OR b) one detection + two mitigation methods, OR c) one detection + one prevention + one mitigation
Further Instructions:

Describe how each technique works. Clearly describe (in detail using your own words), how each technique works. Assume that you are explaining the author's technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and assume the student has no knowledge of the author's research (never read the article before). Discuss each technique or method using the following questions:

Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.

What are the strengths and weaknesses (limitations) of this technique?

Make sure there are No IPR (Intellectual Property Right) issues. This requires the following:

Re-draw all figures and tables.

Summarize all concepts using your own words.

Do not copy any part of text or unmodified figures (short quotes are acceptable.)

Cite references as needed using APA format.

To support your claims or statements, you may cite/reference non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs).

Submission Guidelines

Print format: MS Word or PDF format.
The general structure of your research paper:
Brief Intro
Background (if needed)
Main Sections
Conclusion (if needed)

References

The paper length: 6-10 double space pages (good, solid content which is factual, relevant, and concise), not including the cover page and reference page(s).

Follow the APA format.

Reference no: EM13922322

Questions Cloud

Federal vs. state policy comparison : Federal vs. State Policy Comparison [Pin It] Federal vs. State Policy Comparison Due May 18, Objectives: Format your paper consistent with APA guidelines. Properly cite your references/resource.
Roselle appliance uses a perpetual inventory system : Roselle Appliance uses a perpetual inventory system. For its flat-screen television sets, the January 1 inventory was 5 sets at $563.00 each. On January 10, Roselle purchased 7 units at $751.40 each. The company sold 3 units on January 8 and 5 units ..
Three primary project management organizational structures : In your paper, discuss the situation in which each structure would be the best method to manage a project team. Provide rationale for decisions.
What will happen if gravity becomes zero : What will happen if gravity becomes zero is it possible in earth?
Is the proposed technique a promising : Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer. What are the strengths and weaknesses (limitations) of this technique?
Agesim that you have witnessed in healthcare : What is one example of Agesim that you have witnessed in healthcare? How do you think agesim affects older adults? What do you think nurses can do to stop agesim in healthcare settings?
Planning analytical review for the financial statements : Perform the planning analytical review for the financial statements of Matty Kitchens, analyzing the key movements. Include supporting calculations.
Design and demonstrate an understanding of the principles : Describe the specific methods employed for collecting and processing all of the various sets of data - Compare the major approaches to research design and demonstrate an understanding of the principles and processes involved in developing and addre..
What is the expected number of units short per cycle : What ROP would provide a stockout risk of 10 percent during lead time? What is the expected number of units (pounds) short per cycle?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Contact at least three people at your school or a nearby

1. contact at least three people at your school or a nearby company who use informationnbspsystems. list the systems

  Tools used to avoid losing passphrase

Are there any tools which someone can utilize safely, other than key recovery, to avoid losing his or her passphrase?

  Design a prototype for a standalone desktop

Design a prototype for a standalone desktop OR mobile/tablet application called EILA

  Write a program to print duplicates in a string and count

1. write a program to print duplicates in a string and their count.

  Find the height level of the tree

Find the height - level of the tree and how many leaves does the tree have - Find the probability that the battery will last between 11 and 15 hours.

  Compare the running time of this modification

Compare the running time of this modification with that of the original algorithm on sequences that are nearly sorted or reverse sorted, and on sequences with many identical elements. What do you observe?

  Create a new table for suppliers contact information

1. Create a new table for Suppliers' contact information and set the primary key and appropriate data types for the fields. The table should at least contain the following information: a. Company name and address  b. Representative's name, pho..

  Variety of tools that use to prepare project

In this course, you looked at a variety of tools that you would use to prepare a project. Some areas you looked at included, but were not limited to?

  Discuss recent legislation related to ethical computing.

Discuss recent legislation related to ethical computing.

  Discussion focuses on optimization

Discussion focuses on optimization

  Receiver initiated distributed scheduling algorithms

Receiver initiated distributed scheduling algorithms suppose task pre-emption at the sender site.

  The iss clinic investment in electronic medical records

Do you think that the ISS Clinic investment in electronic medical records added value for the organization? How would you recommend measuring this "value"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd