Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Let’s say that some hacktivist group that shall remain Anonymous has decided to

ID: 3581470 • Letter: L

Question

Let’s say that some hacktivist group that shall remain Anonymous has decided to target your organization’s public web server with a denial of service (DoS) attack. The strategy used is an old one – a TCP SYN flood. Hosts from the Internet are making legitimate connection requests to the web server, but they are not completing the TCP handshake. The web server keeps the port open and the resources allocated to answer the handshake until the handshake times out, which takes several seconds. This quickly exhausts one particular resource of the web server – the number of TCP connections that it can keep open at one time. Legitimate users cannot access the web server. Without expanding the web server’s resources, what are some strategies that you could implement to frustrate the attackers? Describe at least two host-based and two network-based strategies.

Explanation / Answer

Denial of service of attacks means some amount of time unauthorized person has to restrict both client and server services.These causes data will not be reach the destination with in the time stramp.So data will be loss.So their is some strategies is their to frustrate the attakerss those are:

1)NAT for frustration:

These NAT is word to define large number of compueters to advertise only single ip address to public internet.Then these NAT devices maintains a separate table to maintain the private addres and extra communication tags.

2)Application proxies :

In these intruders ha sto maintain proxy servers to detect data .And these internal proxy services has to maintain in seperate way to detect unauthorized data.

3)Maintain encryption and decryption keys for protecting data to client side and both server side .Then data will be restricted.

4)And maintain password will be secured and not telling to any one .

5)Maintain confidential between data .

Host Based strategies :

1) Maintain security policy between different host.That is source and destination hosts.

2)Maintain firewalls for security purposes .And then dectect weak host and maintain strengthly

Network-based strategies:

1)These approch is to be performed as a these systems collecting information in different network itself

2)And controll the network traffic to maintain the security between data

3)And maintain signature between data and encrypt the data in different formats and finally decrypt it.