Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

You may choose the topic and team members. It has to be related to Digital Crime topics studied in this course. For example, some students in the past selected "Attacks against the computer critical...

1 answer below »

You may choose the topic and team members. It has to be related to Digital Crime topics studied in this course. For example, some students in the past selected "Attacks against the computer critical infrastructure of the country", "Financial Crimes", "The Most Important Hackers of the World", "National and International Laws Covering Cybercrime", "Cyberwarfare", "Hacking Techniques", etc. You may come up with your own topic by looking through the course topics or searching on the internet for some more ideas.

The project should be presented in a PowerPoint format, and must provide an in-depth analysis of your topic, such as what you did, why, how and main results, including charts, tables, etc. Include as much technical data as possible when presenting your topic and a comprehensive list of references (avoid Wikis, FB/Twitter posts, etc). A live demo of your project (if appropriate) will be a plus.

Summarize your Capstone Project research. You may use your powerpoint slideshow that you have created for the presentation. So please make sure you KNOW what the slides are saying and please DO NOT read them during the presentation. Although I expect a very comprehensive presentation of 15 slides minimum or so (include also screenshots, charts, graphics, tables, etc.),


Special request on another page (in docs write down please) what should i talk on topic because I can not read from slides. For example slide 2 related to talk.


Do not record presentation it should be in my voice only have to complete research project on following topic will be provided. powerpoint slides and docs (as special requests)


Project Template is provided in the attached file.

Grading rubric provided in attached file screen shot formet


Answered 22 days After Oct 03, 2022

Solution

Aditi answered on Oct 26 2022
56 Votes
IT310 Project
IT332 Project
DDoS : A tool of Cyber Warfare
Student name 1: % work done (out of 100%)
Student name 2: %
Student name 3: %
Student name 4: %
Student name 5: %
Professor: Dipesh Patel | Course: IT332 | Date: ____________
Table of Contents
Title Page
Description of your project
Project details
Technology Package
Market Strategy
Legal Environment
References
Description of your Project
A Distributed Denial of Service (DDoS) attack is indeed a common and almost universal type of cyber attack. Its goal is to disrupt an organization's operations by flooding a target's network, web service, or technological resources with junk traffic. The amount of traffic directed at the goal can severely limit its availability or
ing it completely offline.
DDoS attacks are successful in part because they use web devices that have already infected with malware. To gain remote control, an attacker exploits existing vulnerabilities in tens, thousands and thousands, thousands, or even millions of devices.
The 'Distributed' part of Distributed Denial of Service refers to this process of remote orchestration. With the proliferation of world wide web household items such as refrigerators as well as thermostats, attackers now now have even more mildly encrypted devices to exploit.
Why should DDoS attacks be addressed?
It is difficult to quantify the damage that DDoS attacks can cause. However, an organisation must consider the costs of various consequences, such as the following:
Extended service inte
uption
Employee productivity constraints
Breach of data
Reputational harm
SEO ranking deterioration
Ransomware/extortion attacks
Project Goal
Create a binary classification model that can distinguish between legitimate
enign and malicious traffic in order to mitigate the effects of a DDoS attack on an organization's operations. If the traffic was legitimate, it would routed to a company's services. It would be blocked if it was malicious. This would ensure that service availability for actual users while also protecting against the aforementioned DDoS attacks.
Project Details
The project is about DDoS Attack. We will discuss about it in depth.
We will understand the difference between DoS Attack and DDoS Attack.
I selected this topic so that , I could create a solution that organizations can use to legitimate traffic and defend against...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here