Distributed Denial Of Service Attacks: [Essay Example], 605 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Distributed Denial Of Service Attacks

Print Download now

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

The common use of computers, connected to the Internet, as well as insufficient level of security, allow malefactors to execute large-scale infrastructure attacks, engaging in criminal activity a huge number of computing nodes. Attacks of such type have been traditionally performing by botnets. There are examples of successful large-scale attacks fulfilled by armies of bots. For example, attacks such as distributed denial of service (DDoS), aimed at government websites of Estonia in 2007 and Georgia in 2008 had led to the practical inaccessibility of these sites for several days. In 2009 and 2010 spying botnets “GhostNet” and “Shadow Network” have been occurred in many countries around the world.

Further research of these botnets has shown their presence on governmental servers, which contain important sensitive information. In 2009 a malware “Stuxnet” was discovered, which was capable to affect SCADA-systems and steal intellectual property of corporations. Report “Worldwide Infrastructure Security Report”, published by Arbor Networks in 2010, shows that the total capacity of DDoS attacks in 2010 has grown considerably and has overcome the barrier of 100 GB/sec. It is noted that the power of DDoS-attacks has grown more than twice in comparison with 2009 and more than 10 times in comparison with 2005. In the Concept of biology an Artificial Immune System has designed to be highly changing the distributed monitoring approach by Software Define Systems with Malicious system of a changing artificial immune system.

On this basis, it becomes obvious that existing modern botnets are a very important phenomenon in the network security. Thus, the task of researching botnets and methods of protection against them is important. One of the promising approaches to research botnets and protection mechanisms is simulation.

The System naming distributed Software Define Networking Architecture and the artificial system and Own Arranging Maps to create a network based system capable of indicating and avoiding DDoS attacks in progress. This paper is devoted to investigating botnets, which realize their expansion by network worm propagation mechanisms and perform attacks like “distributed denial of service” (DDoS). The protection mechanisms against botnets are of top-priority here. The main results of this work are the development of integrated simulation environment, including the libraries for implementing models of botnets and models of protection mechanisms. As distinct from other authors’ papers (for example, [12, 13]), this paper specifies the architecture of the integrated simulation environment and describes the set of conducted experiments on simulation of botnets and protection mechanisms against them. The Important thing is resource sharing that cloud sellers have developed the theory of Software Define Networking ( SDN) and network identification. This process involves that SDN environment with OFv1.3 is manageable for monitoring a cloud environmental network to a sufficient enable system based on AIS model to find the DDoS attack in progress.

Comparing with previous research, the architecture of the integrated simulation environment has been substantially revised – more emphasis has been placed to extend the libraries of attacks and protection mechanisms. Also in this version of the simulation environment, we have applied a hierarchical component-based way of representation of architecture. The main attention in the paper is paid to the set of experiments, which provided the opportunity to compare protection methods against botnets on different stages of their life cycle.

The rest of the paper is organized as follows. Section 2 discusses the related work. Section 3 presents the architecture of the integrated simulation environment developed. Section 4 considers the attack and defense models. Section 5 contains the description of implementation and main parameters and the plan of the experiments. Section 6 describes the results of experiments. Concluding remarks and directions for further research are given in Section 7.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019, July, 10) Distributed Denial Of Service Attacks. Retrived June 7, 2020, from https://gradesfixer.com/free-essay-examples/distributed-denial-of-service-attacks/
"Distributed Denial Of Service Attacks." GradesFixer, 10 Jul. 2019, https://gradesfixer.com/free-essay-examples/distributed-denial-of-service-attacks/. Accessed 7 June 2020.
GradesFixer. 2019. Distributed Denial Of Service Attacks., viewed 7 June 2020, <https://gradesfixer.com/free-essay-examples/distributed-denial-of-service-attacks/>
GradesFixer. Distributed Denial Of Service Attacks. [Internet]. July 2019. [Accessed June 7, 2020]. Available from: https://gradesfixer.com/free-essay-examples/distributed-denial-of-service-attacks/
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

close

Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

Recieve 100% plagiarism-Free paper just for 4.99$ on email
get unique paper
*Public papers are open and may contain not unique content
download public sample
close

Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

close

Thanks!

Your essay sample has been sent.

Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

thanks-icon Order now
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!
Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.