Cashback Offer from 1st to 15th March 2021. Get Flat 20% Cashback credited to your account for a minimum transaction of $80. Post Your Question Today!

Question DetailsNormal
$ 32.00

CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution

Question posted by
Online Tutor Profile
request

Description

CSEC640 - Weeks 4 and 5 Individual Assignment #1


DUE DATE: End of Week 5


The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work.

However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or

Distributed DoS). The task of this individual assignment is to write a research paper/report in these

topics.


Topic of the Paper:

Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or

Distributed DoS (DDoS) attacks.


Assignment Guidelines

The following must be considered when you write the report:


1. Select 4 research papers (in addition to those provided/suggested for the class) which

discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks:

a. The research papers must be published by a peer reviewed journal or be published in

conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in

Computer Science (LNCS), etc.).

b. You must not choose papers or research works from magazines or periodicals that are

not research-oriented (e.g., Wikipedia, SANS, etc.).

c. Briefly explain your rationale for selecting a specific research paper.

d. Allocate sufficient time to read the research papers. Reading a research paper

requires more time than most people realize.

2. Summarize each research paper and identify the detection, mitigation, or prevention

techniques described in the papers you selected. You are expected to base your paper on

research that you have found through the library sources along with the papers

provided/suggested for the class. The first paper is selected because of presentation of a

detection technique; the second paper is selected because of a presentation of a prevention

technique, and the third paper because of the presentation of a mitigation technique. Finally, a

fourth research paper that involves a combination of the three topics. You can select 3 papers

if you can justify that the depth and completeness of the selected papers cover the topics of

your research paper. Otherwise, a selection of at least 4 papers is advisable.

3. Describe how each technique works. Clearly describe (in detail using your own words), how

each technique works. Assume that you are explaining the author’s technique to

someone with a fairly strong fundamental knowledge in network and security (e.g., a first

year computer science graduate student) and assume the student has no knowledge of the

author’s research (never read the article before). Discuss each technique or method using

the following questions:

a. Is the proposed technique a promising, practical approach which can be effectively

implemented into an existing platform? Clearly explain your answer.

b. What are the strengths and weaknesses (limitations) of this technique?


4. Make sure there are No IPR(Intellectual Property Right) issues. This requires the following:

a. Re-draw all figures and tables.

b. Summarize all concepts using your own words.

c. Do not copy any part of text or unmodified figures (short quotes are acceptable.)

d. Cite references as needed using APA format.


5. To support your claims or statements, you may also cite/reference other papers and sources

from the reading assignments and outside peer reviewed and non-peer reviewed papers and

journals (including white papers, SANs documents, etc.; do not have to be academic papers or

articles, however, no Wikipedia or blogs).

You must Use Proper APA 6th Edition Format

You should use the APA 6th style manual and there are fine web references that are on line such as

the following:

 Basics of APA Style Format Tutorial

 General Rules for APA Format

 Consider using the Effective Writing Center’s resources

http://www.umuc.edu/writingcenter

 You can also visit the following “Writing a Research Paper” guidelines from Purdue

University and the others listed below for your convenience:

Purdue Online Writing Lab,

Writing a Research Paper

APA Sample Paper

Writing a Research Paper

APA Sample Paper

GUIDE TO WRITING RESEARCH PAPERS

Sample APA Paper for Students Interested in Learning APA Style 6th Edition

 Sample research paper: APA style

You could use the Using Bibme to form bibliographies and with a minor edition make sure they are in

APA 6th format.


Submission Guidelines

 Print format: MS Word.

 The paper length: A minimum of 10 double space pages 12 cpi (good, solid content which is

factual, relevant, and concise), not including the cover page and reference page(s).

 Turnitin.com requirement: Please see the Turnitin Conference posting for Turnitin requirements

and metrics. Post the Turnitin Report in your Assignment’s Folder. The name the document

as follows: LastName_FirstName_IndAssig1_Turnitin.pdf

 Upload your report to your Assignment Folder. The name the document as follows:

LastName_FirstName_IndAssig1.docx

 DUE DATE: End of Week 5 (Two Week assignment – Week 4 and Week 5).

The suggested structure of your research paper must be as follows:


Abstract

Contents (Optional)

Introduction

Denial of Service Attacks explained

Symptoms of Denial of Service (DoS) Attacks

Common Types of Denial of Service (DoS) Attacks

Topic 1 – Detection

Reviewed Research Paper One – by

Rationale/ Relevance of this Paper

Summary of Research

Techniques Examined ---- Or Techniques Description

(“ . . Clearly describe how each technique works . . .“)

Strengths and Weaknesses of Each Technique

Ease of Implementation

Topic 2 – Prevention

Reviewed Research Paper Two – by

Rationale/ Relevance of this Paper

Summary of Research

Techniques Examined ---- Or Techniques Description

(“ . . Clearly describe how each technique works . . .“)

 


Strengths and Weaknesses of Each Technique

Ease of Implementation

Topic 3 – Mitigation

Reviewed Research Paper Three – by

Rationale/ Relevance of this Paper

Summary of Research

Techniques Examined ---- Or Techniques Description

(“ . . Clearly describe how each technique works . . .“)

Strengths and Weaknesses of Each Technique

Ease of Implementation

Topic 4 – A paper that contains a summation of the three topics- Detection, Prevention,

and Mitigation

Reviewed Research Paper Four – by

Rationale/ Relevance of this Paper

Summary of Research

Techniques Examined ---- Or Techniques Description

(“ . . Clearly describe how each technique works . . .“)

Strengths and Weaknesses of Each Technique

Ease of Implementation

Further Discussion on DoS and DDoS Attacks

Conclusions and Synopsis

References

Grading Criteria – CSEC640 IA #1

This assignment is worth 10 percent of your total grade.

Criteria Excellent A (90+) Satisfactory B (80-89)

Content (80%)

3-4 Research papers selected as

per assignment guidelines item

 

All the selected research papers

are from scholarly sources and

All the research papers selected

are from scholarly sources

Below Expectations

(below 80)

Not all the research papers

selected are from scholarly

A.

(0-25 points)

Clarity of discussion of the

summary and identification of

the 3 techniques for each paper

as explained in assignment

guidelines item B

(0-25 points)

Clarity of discussion of the

way each technique works as

explained in assignment

guidelines item C

(0-25 points)

Quality of support

documentation (excluding the

3-4 research papers) as

explained in assignment

guideline item E

(0-5 points)

Paper Format (20%)

Organization & length

(0-7points)

Writing style

(0-7points)

Use of proper APA formatting

(0-6 points)

directly related to detection,

prevention or mitigation

techniques for DoS or DDoS

attacks as per assignment

guideline. The rationale for

selection is well explained.

Each research paper is well

summarized, and the 3

techniques are clearly

identified for each paper

Each technique identified is

clearly described as per

assignment guidelines

The discussion in the paper is

based on thorough review of

the literature.

however are not directly

related to detection, prevention

or mitigation techniques for

DoS or DDoS attacks.

Rationale for selection is

adequately explained.

Each research paper is

adequately summarized and the

3 techniques adequately

identified for each paper

Each technique identified is

adequately described as per

assignment guidelines

The discussion in the paper is

based on an adequate review of

the literature.

 

The content is well organized

with clear transitions among

major subtopics. Meets length

requirements.

Graduate level writing is

reflected throughout the paper,

including accurate spelling,

punctuation, grammar, and

sentence structure.

In-text citations are presented

in proper APA format and all

sources are identified in the

reference list and cited in

proper APA format.

The content is generally well

organized with some

improvement possible in

transitioning among subtopics.

Meets length requirements.

Writing is acceptable, a few

errors in spelling, punctuation,

grammar, and/or sentence

structure.

Minor errors in citation

identification and/or APA

format.

CSEC640 Individual Assignment #1 - Grading and Feedback for Student

Name:_______________________

Criteria Points Comments

Content (80%)


3-4 Research papers selected as per

assignment guidelines item A.

(0-25 points)

Clarity of discussion of the summary and

identification of the 3 techniques for each

paper as explained in assignment

guidelines item B

(0-25 points)

Clarity of discussion of the way each

technique works as explained in

assignment guidelines item C

(0-25 points)

Quality of support documentation

(excluding the 3-4 research papers) as

explained in assignment guideline item E

 

 

sources and/or are not directly

related to detection, prevention

or mitigation techniques for

DoS or DDoS attacks

Each research paper is poorly

summarized and/or the

techniques poorly identified for

each paper

The techniques identified are

poorly described and do not

follow assignment guidelines

The literature review presented

in the paper is inadequate.

The organization of the content

is confusing without clear

transitions among subtopics.

Does not meet length

requirements.

Writing does not meet graduate

standards. Unacceptable

number of errors in spelling,

punctuation, grammar,

sentence structure, and/or

citation format.

Unacceptable number of errors

in citation identification and/or

APA format.

(0-5 points)

Paper Format (20%)

Organization & length

(0-7points)

Writing style

(0-7points)

Use of proper APA formatting

(0-6 points)

 


Total Points (0-100 points)

Overall Comments

 

Available Answer
$ 32.00

[Solved] CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution

  • This solution is not purchased yet.
  • Submitted On 20 Dec, 2015 01:22:09
Answer posted by
Online Tutor Profile
solution
Now days, Denial of service (DoS) attack has become a threat to the computer system. This article provides the overview of th...
Buy now to view the complete solution
Other Similar Questions
User Profile
AceTu...

CSEC640 - Individual Assignment | Complete Solution

This Tutorial is rated A+ previously,if you have any questions regarding this tutorial then you can contact me....
User Profile
Exper...

CSEC640 - Weeks 4 and 5 Individual Assignment #1 | Complete Solution

Now days, Denial of service (DoS) attack has become a threat to the computer system. This article provides the overview of the Denial of Service (DoS) attack and the techniques to detect prevent and mitigate the Denial of Ser...

The benefits of buying study notes from CourseMerit

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35