An Evaluation of Current Computer Network Attack Techniques, Their Minimization Measures plus the Development of a better Denial of Service (Dos) Attack Version

 Essay regarding An Evaluation of Current Computer Network Attack Methods, Their Mitigation Measures plus the Development of an Improved Denial...








ABSTRACT -- This daily news presents the network harm profiles, taxonomies, classification and identification frames.

Further, current approaches to get intrusion diagnosis on systems were x-rayed though, with emphasis on Denial of Service (DoS) disorders only.

The idea of intelligent agents and consequently adaptive devices was elucidated, the properties derived were used being a proof of principle, and then utilized in the progress a model intended for an adaptable intelligent multi-agent for network protection, against denial of service attacks. KEYWORDS: Agent, Denial of Service assault, Dynamic Sponsor Configuration Process, Transmission Control Protocol, as well as Internet Process


Since the world has moved even more into information – influenced global overall economy, the value of info, and managed access to that information, is never greater [1]. The goal of IT system therefore is usually to create devices that can identify and force away unauthorized access while featuring timely usage of legitimate users. Today's network must be capable to respond to problems in ways that maintain network availability and reliability and permit a business to continue to function. In many respects, the goal of protection is to produce networks even more resilient by causing them more flexible. Rather than succumb, networks has to be able to absorb attacks and remain operational, much in a similar manner the human immune system allows us to continue to keep functioning in the presence of viruses and related microbe infections. The future of protection technology has changed more within the last three years than it did in the preceding ten years [2]. The extent of the changes, in addition to the rate of changes, has turned it difficult pertaining to security IT departments to maintain these difficulties. Before THIS departments may regain control, they must better understand the changing technological surroundings.

A network can no longer become secured by securing the network edge [2], since organizations have consolidated their data centers, converged internal sites, and embraced the internet. Technically, the sorts and nature of reliability planning followed have to associate especially with the attack profiles such as:

App layer attacks, auto notes, backdoors, guy – in –the – middle disorders, network investigation, packet sniffers, password disorders, brute force attacks, interface redirection disorders, trojan equine attacks and viruses, trust exploitation disorders, Denial of Service (DoS) and Allocated Denial of service (DDoS) attacks [3]. Denial of Service attacks is known as a major source of incorrect procedures in the internet and is arguably probably the most serious threats that the net community confronts today [4], [5]. Through the time it is detected and recovered coming from, the patient is nearly paralyzed and cannot reply to legitimate demands. For huge commercial sites, this means losses of billions of us dollars in magnitude [6]. Corporate networks, and the episodes used to exploit them, are extremely complex that no single system can be depended on to keep these people secure. This has led to the concept of " Defense in Depth” [2]. Until just lately, this concept was built around the notion of proactive protection. The network security community, in the spirit of postulations of this job, has begun planning to seemingly not related real – world illustrations such as human` immune system as a model pertaining to the personal – guarding network. Various other real – world devices that have as well proven to be instructive can be found in the field of epidemiology in addition to the way Ihekweaba Ogechi ain al. / International Journal of Engineering and Technology (IJET) ISSN: 0975-4024 Vol 5 No 2 Apr-May 2013 1781

communities police themselves. A common theme with all of these systems is that they employ...

References: [3] Todd Lammle, " Cisco Certified Network Associate Examine Guide 6th Edition”. Section 10 site 611 -613, 2007.

[13] Genge Field, Gwilyn Jenkins, and Gregory Reinsel, " Time series analysis forecasting and control”. Prentice-Hall, Nyc, NY, 1986.

[14] Ronald Bracewell, " The Fourier Transform as well as Applications”. Series in power engineering. Mc Graw Slope. New York NYC,


[15] H. Debar, M. Becker, and G. Sibon, " A neural network element for a great intrusion recognition system”. In proceeding with the IEEE

laptop society seminar on exploration in Protection and personal privacy, 1992.

[16] S. Kumar and At the. H. Spafford, " A credit application of design matching in intrusion detection”. In technological report CSDTR-94-013, Purdue

college or university, 1994.

[17] K. Ghosh, " Learning program actions profiles to get intrusion detection”. In process of the initial USENIX workshop on attack

detection and network monitoring, 1991.

[20] R. Agrawal, T. Imielinski, and A. Swami, " Mining association rules between set of things in significant database”. In proceeding of the 1993

foreign conference upon management of information (SIGMOD93), ACM press, vol(22) issue 2, 1993, web page 207-216.

[21] W. Lee, and S i9000. Stolfo " Data mining approaches to get intrusion detection”. In going forward of the 7th USENIX protection symposium, 98.

[23] article (last accessed: This summer 06 2006).

[31] R. Oliveira, " Network managing with knowledge of Requirement: Make use of software Agents”. PhD thesis, 1998.

[32] M. Wooldridge and N. R. Jennirys " Clever Agents: Theory and practice”. Knowledge Architectural Review, 1995.

[34] T. P. Muller, ” The style of intelligent Agents- A layered approach”. LNA1 state-of-the fine art survey, springer, Berlin, Philippines, 1996.

[35] M. Asaka, S. Okasa wa, A. Taguchi, and S. " A method of doing a trace for intruders by use of portable agents”. In INET'99, 99.

[37] M. C. Bernades and At the. Dos Santos Mareira. Rendering of an intrusion detection program based in cellular agents. In international

symposium on software engineering intended for parallel and distributed program, 2000.

Technological report, school of Minnesota, 2002.

[40] A. Rao and M. Geogeff, " BDI agent: from theory of practice technical take note, 1991.

[44] Neil's Ferguson, Bruce Schenier, " Practice cryptogram”, Wiley publishing, Incorporation. 2003.

[48] Ari Juels and David Brainerd, " Client challenge: Cryptographic defense against connection depletion attacks”. In S. Kent, publisher,

proceedings of NDSS, while, 1999.

[52] Jocobson, I actually, Booch, G. and M. Rumbanyh, " The Specific Software Creation Process, Addison –Wesley, 1999.

Case Study several Essay

Example 7. one particular Meat Anderson Grand Canyon College or university: ADM 624 July 24, 2013 1 . Aravind is prosperous because each organizational…...


Essay about Computer Security Issues

Reliability of Laptop Network Program Abstract: This kind of paper talked about the protected and dependable problem about the computer network system. On some aspects: the importance of network reliability…...


Reasons why the NSa is usually Not a Problem Composition

PRO – The benefits of home-based surveillance by the NSA outweigh the harms. DEFINITIONS: The term benefit is identified as, " being useful or helpful to (someone…...


Essay regarding Mcdonalds Italy

Inside the following examination, the selected opportunity will be the businesses of McDonald's in the France market pertaining to global approaches. In order to evaluate the implemented strategy, it first…...


Scientific Strategies Essay

Component 1 Ruben wants to determine whether listening to several types of music may have an effect over a person's pulse. His speculation states that if a person…...


360 Degree Appraisal Composition

360 degree appraisal has several integral elements: 1 ) Self appraisal installment payments on your Superior's appraisal three or more. Subordinate's…...