Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ks] Security Techniques a) [4 marks] What is meant by the term Denial of Service

ID: 3907164 • Letter: K

Question

ks] Security Techniques a) [4 marks] What is meant by the term Denial of Service (DoS) attack? b) [2 marks] Give an example of a Denial of Service (DoS) attack. c) [6 marks] What is the main difference between a packet-level firewall and Intrusion Detection System (IDS)/Intrusion Prevention Systems? d) [8 marks] A laptop user is connected via WiFi to an access point which uses WPA2 security. The user is accessing their bank account via HTTPS protocol that employs SSL. The user realised that all their information is being encrypted twice once by the SSL implementation within the browser and then a second time by the WiFi interface card. The user thinks that this is unnecessary because once information has been encrypted it is secured and encrypting it again provides little improvement in security. Is it true that the double encryption is wasted effort in this example or are the two layers of encryption each valuable in their own right? Explain your answer by either showing that one of the layers could be removed without creating a security risk for the user, or by showing that both security layers are needed to provide the user with the security that thy truly require. (Hint: You should think about other threats in addition to threats against the bank account traffic.)

Explanation / Answer

1.A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service.
In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.


2.A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system,
usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a bot net)
flooding the targeted system with traffic


3.Intrusion Detection System:-
-----------------------------

->The Main purpose of the Intrusion Detection system is to generate log message for identifying an issues during the any suspicious activity.
->It is system that monitors network traffic for suspicious activity and issues alerts when such type of activity is discovered.
-> That means Which controls the Overall Network Traffic in-order to protect the system from suspicious activities.
->And Provides a high level Security to detect the Mal-function activities.

->It is like a device or application that analyzes whole packets, both header and payload, looking for known events.
When a known event is detected a log message is generated detailing the event.
->The Advantages of an Intrusion Detection System is increase the security level of networks, monitoring traffic
and inspecting and scanning packets for suspicious data.

->The Intrusion Detection System can be Categorized into Two Types.
1.host-based
2.network-based.
Intrusion Protection System:-
-------------------------------
->The Main Purpose of An Intrusion Prevention System is used to control the Network Traffic and take a Certain Action to protect the System.
->Which blocks the all suspicious activities in order to protect the system from attack and abuse.
->Which provides the High level Security for the Systems,why because Automatically it will take Necessary Action when any event occurs.
and prevents the attacks it is easily identifying the network threats and respond immediately take an action to prevent.
->The Major Difference between these two systems
->An Intrusion Detection System simply inform the administrator that suspicious activity took place.
Where as In Intrusion Prevention System have the ability to block the suspicious traffic from entering the network.
->An intrusion prevention system (IPS) monitors network packets for potentially damaging network traffic.
But where an intrusion detection system responds to potentially malicious traffic by logging the traffic and issuing warning notifications.
While intrusion prevention systems respond to such traffic by rejecting the potentially malicious packets.