Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Thesis artefact 

The Aim of this assessment is to come up with an effective and new detection method against botnet DDoS (Distributed Denial of Service) type of attack by doing a testbed. 

The objectives to achieve this aim: 
Use Harvard referencing 

This thesis artefact is flexible in a sense that helper can use any other sort of tools to accomplish the task as long as it matches with the aim but please, let me know how he/ she going to do it. 

We can use Virtualbox or any other software that allow us to accomplish the following objectives 

1) Using linux server that is running SNORT IDS that does network packet monitoring. The SNORT should basically do the job of packet monitoring such as UDP, HTTP, and Port and outputting the captured packet logs into human readable language (maybe mysql, ossim or any other convenient software) 

2) Using another server that can be any like window XP or linux that is acting as botnet (any botnet as long as it is not older than 4 years) that lunches a DDoS attack to linux server. 

The Linux server that is running SNORT should be configured with customized new and unique rules (perhaps 2 or 3 rules) that should show how effective it is to detect the botnet based DDoS bandwidth attacks. 

The SNORT should send alerting messages to linux server in the form of e-mail message whenever there is possible Botnet Based DDoS attack. The e-mail alert messages should be triggered based on the customized new and unique rules (perhaps 2 or 3 rules). These customized new and unique rules are configured to for botnet ddos based attack detection. 

We need to write short introduction about this artefact 

Short description of tools that is used to produce this thesis report 

Providing screen shots into the body of the report if it is relevant to put (screen shots can be such as alerting e-mail messages, network packet picture under normal function and under botnet based ddos attack. 

We need to present the report showing how the new and customized snort rule is effective to detect botnet based ddos attack in comparison to snort normally configured rule. 

We need to do screen shots of SNORT installation and other tool's command that are used to produce this thesis artefact in appendix. 

When customizing SNORT new and unique rule - it should be easy to understand for normal users. All the explanation on what each element used in SNORT'S new and unique rule should be explained. The header and body of the new and customized SNORT rule should contain type of botnet ddos it detects, time and any other relevant information. 

Analysis of the snort detection result 

In conclusion, we can provide analytical discussion about what type of botnet ddos the new snort rule is able to detect and what are the strengths and limitation of this new snort rules are in comparison to any other tools that detects the botnet based ddos attack.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9431394

Have any Question?


Related Questions in Computer Engineering

Question suppose an algorithm requires cn2nbspoperations

Question : Suppose an algorithm requires cn 2  operations when performed with an input of size n (where c is a constant). a. How many operations will be required when the input size is increased from m to 2m (where m is ...

What is the probability of a value from a normal

What is the probability of a value from a normal distribution being between 0.75 standard deviations above the mean and 1.75 standard deviations below the mean? (Round calculations to nearest thousandth (3 digits))

What is a security policy and why is it so critical to the

What is a security policy and why is it so critical to the success of an organization's information security program? Select an Issue Specific Security Policy and describe why an organization should have this issue cover ...

A small sports club keeps information about its members and

A small sports club keeps information about its members and the fees they pay. The secretary wants to be able to record when members pay and print a report similar to that in the figure below. last n me - first_narne - p ...

Question sally averages 5 strokes a hole when she plays

Question: Sally averages 5 strokes a hole when she plays golf. One day, she took 40 strokes to complete the first nine holes. Her partner conjectured that she would probably regress to the mean and take 50 strokes to com ...

Specifically you will create an e-commerce application

Specifically, you will create an e-Commerce application using PHP and HTML that allows a user to login to a website, select several products for purchase and then place an order for those items selected. The type of prod ...

One-year treasury bills currently earn 225 percent you

One-year Treasury bills currently earn 2.25 percent. You expected that one year from now, 1-year Treasury bill rates will increase to 2.75 percent and that two years from now, 1-year Treasury bill rates will increase to ...

I really do not know where to begin with this

I really do not know where to begin with this asignement. Activity Description A key aspect to planning is having an understanding of some of the layers involved in networks. This assignment examines a few of these layer ...

Write a program to calculate the average temperature for

Write a program to calculate the average temperature for the year and determine the hottest month of the year. In your main method, the program should collect the user input of the average Fahrenheit temperatures for eac ...

Question in ruby as in java 8 or scala an interface mix-in

Question : In Ruby, as in Java 8 or Scala, an interface (mix-in) can provide method code as well as signatures. (It can't provide data members; that would be multiple inheritance.) Explain why dynamic typing makes this f ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As