Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Networking and Security A programming project to simulate a network attack (thre

ID: 3854536 • Letter: N

Question

Networking and Security A programming project to simulate a network attack (threat) mechanism or a defense mechanism. Preferably you use kali Linux Please include these aspects in the project -General idea about the purpose of your project (i.e., functionality) - Tools / Software packages / languages / environments that you will utilize - What is your contribution - Criteria of success and demonstrability FYI: please create a real attack or defense in a fake website and show the steps. Thank you
Networking and Security A programming project to simulate a network attack (threat) mechanism or a defense mechanism. Preferably you use kali Linux Please include these aspects in the project -General idea about the purpose of your project (i.e., functionality) - Tools / Software packages / languages / environments that you will utilize - What is your contribution - Criteria of success and demonstrability FYI: please create a real attack or defense in a fake website and show the steps. Thank you
Networking and Security A programming project to simulate a network attack (threat) mechanism or a defense mechanism. Preferably you use kali Linux Please include these aspects in the project -General idea about the purpose of your project (i.e., functionality) - Tools / Software packages / languages / environments that you will utilize - What is your contribution - Criteria of success and demonstrability FYI: please create a real attack or defense in a fake website and show the steps. Thank you

Explanation / Answer

A simple project idea is simulate a Denial of service attack (DDos Attack).

The idea is that create a simple server, which has to do some heavy computation. Run several client programs which try to connect to server multiple times and thus slowing down the server. You can automate the process by running multiple clients on single machine, or multiple machines.

Any sort of Linux distribution with C socket libraries can be used to demonstrate this project

If it can be successfully shown that multiple clients attempting to slow down or crash the server, then the attack is successfull.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote