CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution

- ExpertT
- Rating : 109
- Grade : A+
- Questions : 0
- Solutions : 1026
- Blog : 0
- Earned : $52808.54

Description
CSEC640 - Weeks 4 and 5 Individual Assignment #1
DUE DATE: End of Week 5
The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work.
However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or
Distributed DoS). The task of this individual assignment is to write a research paper/report in these
topics.
Topic of the Paper:
Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or
Distributed DoS (DDoS) attacks.
Assignment Guidelines
The following must be considered when you write the report:
1. Select 4 research papers (in addition to those provided/suggested for the class) which
discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:
a. The research papers must be published by a peer reviewed journal or be published in
conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in
Computer Science (LNCS), etc.).
b. You must not choose papers or research works from magazines or periodicals that are
not research-oriented (e.g., Wikipedia, SANS, etc.).
c. Briefly explain your rationale for selecting a specific research paper.
d. Allocate sufficient time to read the research papers. Reading a research paper
requires more time than most people realize.
2. Summarize each research paper and identify the detection, mitigation, or prevention
techniques described in the papers you selected. You are expected to base your paper on
research that you have found through the library sources along with the papers
provided/suggested for the class. The first paper is selected because of presentation of a
detection technique; the second paper is selected because of a presentation of a prevention
technique, and the third paper because of the presentation of a mitigation technique. Finally, a
fourth research paper that involves a combination of the three topics. You can select 3 papers
if you can justify that the depth and completeness of the selected papers cover the topics of
your research paper. Otherwise, a selection of at least 4 papers is advisable.
3. Describe how each technique works. Clearly describe (in detail using your own words), how
each technique works. Assume that you are explaining the author’s technique to
someone with a fairly strong fundamental knowledge in network and security (e.g., a first
year computer science graduate student) and assume the student has no knowledge of the
author’s research (never read the article before). Discuss each technique or method using
the following questions:
a. Is the proposed technique a promising, practical approach which can be effectively
implemented into an existing platform? Clearly explain your answer.
b. What are the strengths and weaknesses (limitations) of this technique?
4. Make sure there are No IPR(Intellectual Property Right) issues. This requires the following:
a. Re-draw all figures and tables.
b. Summarize all concepts using your own words.
c. Do not copy any part of text or unmodified figures (short quotes are acceptable.)
d. Cite references as needed using APA format.
5. To support your claims or statements, you may also cite/reference other papers and sources
from the reading assignments and outside peer reviewed and non-peer reviewed papers and
journals (including white papers, SANs documents, etc.; do not have to be academic papers or
articles, however, no Wikipedia or blogs).
You must Use Proper APA 6th Edition Format
You should use the APA 6th style manual and there are fine web references that are on line such as
the following:
Basics of APA Style Format Tutorial
General Rules for APA Format
Consider using the Effective Writing Center’s resources
http://www.umuc.edu/writingcenter
You can also visit the following “Writing a Research Paper” guidelines from Purdue
University and the others listed below for your convenience:
Purdue Online Writing Lab,
Writing a Research Paper
APA Sample Paper
Writing a Research Paper
APA Sample Paper
GUIDE TO WRITING RESEARCH PAPERS
Sample APA Paper for Students Interested in Learning APA Style 6th Edition
Sample research paper: APA style
You could use the Using Bibme to form bibliographies and with a minor edition make sure they are in
APA 6th format.
Submission Guidelines
Print format: MS Word.
The paper length: A minimum of 10 double space pages 12 cpi (good, solid content which is
factual, relevant, and concise), not including the cover page and reference page(s).
Turnitin.com requirement: Please see the Turnitin Conference posting for Turnitin requirements
and metrics. Post the Turnitin Report in your Assignment’s Folder. The name the document
as follows: LastName_FirstName_IndAssig1_Turnitin.pdf
Upload your report to your Assignment Folder. The name the document as follows:
LastName_FirstName_IndAssig1.docx
DUE DATE: End of Week 5 (Two Week assignment – Week 4 and Week 5).
The suggested structure of your research paper must be as follows:
Abstract
Contents (Optional)
Introduction
Denial of Service Attacks explained
Symptoms of Denial of Service (DoS) Attacks
Common Types of Denial of Service (DoS) Attacks
Topic 1 – Detection
Reviewed Research Paper One – by
Rationale/ Relevance of this Paper
Summary of Research
Techniques Examined ---- Or Techniques Description
(“ . . Clearly describe how each technique works . . .“)
Strengths and Weaknesses of Each Technique
Ease of Implementation
Topic 2 – Prevention
Reviewed Research Paper Two – by
Rationale/ Relevance of this Paper
Summary of Research
Techniques Examined ---- Or Techniques Description
(“ . . Clearly describe how each technique works . . .“)
Strengths and Weaknesses of Each Technique
Ease of Implementation
Topic 3 – Mitigation
Reviewed Research Paper Three – by
Rationale/ Relevance of this Paper
Summary of Research
Techniques Examined ---- Or Techniques Description
(“ . . Clearly describe how each technique works . . .“)
Strengths and Weaknesses of Each Technique
Ease of Implementation
Topic 4 – A paper that contains a summation of the three topics- Detection, Prevention,
and Mitigation
Reviewed Research Paper Four – by
Rationale/ Relevance of this Paper
Summary of Research
Techniques Examined ---- Or Techniques Description
(“ . . Clearly describe how each technique works . . .“)
Strengths and Weaknesses of Each Technique
Ease of Implementation
Further Discussion on DoS and DDoS Attacks
Conclusions and Synopsis
References
Grading Criteria – CSEC640 IA #1
This assignment is worth 10 percent of your total grade.
Criteria Excellent A (90+) Satisfactory B (80-89)
Content (80%)
3-4 Research papers selected as
per assignment guidelines item
All the selected research papers
are from scholarly sources and
All the research papers selected
are from scholarly sources
Below Expectations
(below 80)
Not all the research papers
selected are from scholarly
A.
(0-25 points)
Clarity of discussion of the
summary and identification of
the 3 techniques for each paper
as explained in assignment
guidelines item B
(0-25 points)
Clarity of discussion of the
way each technique works as
explained in assignment
guidelines item C
(0-25 points)
Quality of support
documentation (excluding the
3-4 research papers) as
explained in assignment
guideline item E
(0-5 points)
Paper Format (20%)
Organization & length
(0-7points)
Writing style
(0-7points)
Use of proper APA formatting
(0-6 points)
directly related to detection,
prevention or mitigation
techniques for DoS or DDoS
attacks as per assignment
guideline. The rationale for
selection is well explained.
Each research paper is well
summarized, and the 3
techniques are clearly
identified for each paper
Each technique identified is
clearly described as per
assignment guidelines
The discussion in the paper is
based on thorough review of
the literature.
however are not directly
related to detection, prevention
or mitigation techniques for
DoS or DDoS attacks.
Rationale for selection is
adequately explained.
Each research paper is
adequately summarized and the
3 techniques adequately
identified for each paper
Each technique identified is
adequately described as per
assignment guidelines
The discussion in the paper is
based on an adequate review of
the literature.
The content is well organized
with clear transitions among
major subtopics. Meets length
requirements.
Graduate level writing is
reflected throughout the paper,
including accurate spelling,
punctuation, grammar, and
sentence structure.
In-text citations are presented
in proper APA format and all
sources are identified in the
reference list and cited in
proper APA format.
The content is generally well
organized with some
improvement possible in
transitioning among subtopics.
Meets length requirements.
Writing is acceptable, a few
errors in spelling, punctuation,
grammar, and/or sentence
structure.
Minor errors in citation
identification and/or APA
format.
CSEC640 Individual Assignment #1 - Grading and Feedback for Student
Name:_______________________
Criteria Points Comments
Content (80%)
3-4 Research papers selected as per
assignment guidelines item A.
(0-25 points)
Clarity of discussion of the summary and
identification of the 3 techniques for each
paper as explained in assignment
guidelines item B
(0-25 points)
Clarity of discussion of the way each
technique works as explained in
assignment guidelines item C
(0-25 points)
Quality of support documentation
(excluding the 3-4 research papers) as
explained in assignment guideline item E
sources and/or are not directly
related to detection, prevention
or mitigation techniques for
DoS or DDoS attacks
Each research paper is poorly
summarized and/or the
techniques poorly identified for
each paper
The techniques identified are
poorly described and do not
follow assignment guidelines
The literature review presented
in the paper is inadequate.
The organization of the content
is confusing without clear
transitions among subtopics.
Does not meet length
requirements.
Writing does not meet graduate
standards. Unacceptable
number of errors in spelling,
punctuation, grammar,
sentence structure, and/or
citation format.
Unacceptable number of errors
in citation identification and/or
APA format.
(0-5 points)
Paper Format (20%)
Organization & length
(0-7points)
Writing style
(0-7points)
Use of proper APA formatting
(0-6 points)
Total Points (0-100 points)
Overall Comments
[Solved] CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution
- This solution is not purchased yet.
- Submitted On 20 Dec, 2015 01:22:09

- ExpertT
- Rating : 109
- Grade : A+
- Questions : 0
- Solutions : 1026
- Blog : 0
- Earned : $52808.54


CSEC640 - Individual Assignment | Complete Solution

CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution
The benefits of buying study notes from CourseMerit

Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.