Bonanza Offer FLAT 20% off & $20 sign up bonus Order Now
CO874
UK
University of Kent
The OS and browser information is found from the packet and from the information it can be said that Windows 7 NT 6.1 and the user-agent is for internet explorer 11.
The TCP stream is followed for the HTTP GET request and the website from where the infection spreaded is shown.
Drive by download occurs while vising a web page, opening pop ups or clicking links and iframe has the feature to embed link. The feature is allowed since it is used by some legitimate business and website for legitimate purpose. It is not considered as a security risk since it is safe to download a file until it is executed. If the iframe pops to download any file it can be a sign of drive by download.
Kerbs on security DDOS attack was made in the year 2016 and it exceeded 620 gbps and the source was mirai botnet. The bot have compromised 600000 IOT devices. For blocking the attack strong password is needed to be used for the IoT devices and restarting the affected system.
Stealth scans can be performed using nmap and it includes the following steps:
Most of the intrusion detection system can alert the admin about scan and block by sending an alert message. It can also find the IP address of the machine performing the scan. SNORT is a popular IDS and has signatures and rules set for detecting scan (Rao and Nayak 2014). By default, a minimum threshold of 15 ports per second and it is needed to be modified for detecting the stealth scan.
In normal method the TCP SYN attack is detected by collecting the packet over times and if the flood rate that is set in the rule is exceeded then an alert is sent.
For the anomaly based detection a robust profile is needed to be created and it may contain the following data:
Rao, U. and Nayak, U. (2014) "Intrusion Detection and Prevention Systems", The InfoSec Handbook, pp. 225-243. doi: 10.1007/978-1-4302-6383-8_11.
Understanding TCP Sequence and Acknowledgment Numbers - PacketLife.net (2021). Available at: https://packetlife.net/blog/2010/jun/7/understanding-tcp-sequence-acknowledgment-numbers/ (Accessed: 14 April 2021).
Need to wrap up assignments on time? Stringent deadlines getting the better of you? Our in-house academic papers writers are available round the clock to work on your assignments and share the same much ahead of the deadline. From offering Finance assignment help to backing you up with Law assignment help in London, we are right here to assist you through the thick and thin of assignment stringencies. So, the next time you would worry about a narrow deadline or wonder, “Can I pay someone to do my assignment on time?” count on us and never look back.
Upload your Assignment and improve Your Grade
Boost Grades