Re-draw all figures and tables


Description

The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work. However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or Distributed DoS). The task of this individual assignment is to write a research paper/report on the following topic:

A technique or scheme for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks. 

Assignment Guidelines

The following must be considered when you write the report:

Select 3-4 research papers on a topic of interest which discusses detection, prevention, or mitigation techniques for DoS or DDoS attacks. The research papers must be published by a peer reviewed journal or be published in referred conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.). For this step, you must not choose any papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.). Briefly explain your rationale for selecting a specific research paper.
Allocate sufficient time to read the research papers. Reading a research paper requires more time than most people realize.

Summarize each research paper and identify three different detection, mitigation, or prevention techniques described in the papers which you selected from the previous step (step 1). Include one detection technique (e.g., one detection + two prevention methods, one detection + two mitigation methods, or one detection + one prevention + one mitigation). In your own words, clearly describe how each technique works in detail. Assume that you are explaining the author's technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and with no knowledge of the author's research (never read the article before). 

Discuss each technique or method using the following questions:
Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.
What are the strengths and weaknesses (limitations) of this technique?

No IPR (Intellectual Property Right) issues. This requires the following: 

Re-draw all figures and tables.
Summarize all concepts using your own words.
Do not copy any part of text or unmodified figures (short quotes are acceptable.)
Cite references as needed using APA format.

To support your claims or statements, you may cite/reference non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs). 

Submission Guidelines

Print format: MS Word or PDF format. 
The general structure of your research paper:
Name and Title
Brief Intro
Background (if needed)
Main Sections
Conclusion (if needed)
References

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Re-draw all figures and tables
Reference No:- TGS0113258

Expected delivery within 24 Hours