PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Tuesday, January 17, 2012

::: vuaskari.com ::: CS610 idea solution

Edit and submit
Question 1:
SOME SOLUTIONS TO DOS ATTACKS: The way DoS and DDoS attacks are perpetrated, by exploiting limitations of protocols and applications, is one of the main factors why they are continuously evolving, and because of that presenting new challenges on how to combat or limit their effects. Even if all of these attacks cannot be completely avoided, some basic rules can be followed to protect the network against some, and to limit the extent of the attack: • Make sure the network has a firewall up that aggressively keeps everything out except legal traffic. • Implement router filters. This will lessen the exposure to certain denial-of-service attacks. Additionally, it will aid in preventing users on network from effectively launching certain denial-of-service attacks. • Install patches to guard against TCP/IP attacks. This will substantially reduce the exposure to these attacks but may not eliminate the risk entirely. • Observe the system performance and establish baselines for ordinary activity. Use the baseline to gauge unusual levels of disk activity, CPU usage, or network traffic.


Question 2:
LIMITING DAMAGE DURING A SUCCESSFUL ATTACK The central idea of this strategic objective is to limit damage in the trans-attack period by constructing an "incident management" system. The premised technical capability is the ability of the defender to audit system operation, to be able to detect an attack underway, and to take steps in real-time to limit the extent of the damage. "Defender" can apply to the company level, the industry level, or the national level. Damage limitation implies, beyond having attack "templates" to enable recognition that an attack is under way, the linking of system operation centers to higher-level analysis centers for situation awareness and attack assessment. This also implies having pre-established response options at the company, industry, or national level. Several kinds of responses are possible. Adaptive defense allows a defender to increase levels of defense, Such as calling for re-authentication of all users, or those currently undertaking critical functions or accessing critical information, putting critical transactions in "quarantine" until they can be more thoroughly scrutinized, backing-up system status, providing real-time warning to other systems, and increasing the collection of forensic evidence.
Edit and submit

--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.