Computer Sciences and Information Technology
Topic:
]
Crimes Related to Hacking into Servers: Denial of Service Attacks
You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review. You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review.
American Military University
Denial of Service Attacks
Outline
Introduction
• What is Denial of Service Attacks
• Why mis Denial of Service Attacks (DoS) an important topic when it comes to crimes related to hacking into servers.
• The mechanism employed in DoS attack
Literature Review
• Definition of Denial of Service Attacks (DoS)
• Detecting Denial of Service Attacks (DoS)
• Most Famous DoS Attacks.
• How to resolve Denial of Service Attacks (DoS)
Research Question
• How to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
• Use of literature sources from databases associated with information technology studies.
Proposal
For a long time, computer hacking has been a key subject in the are of information technology. This is because of the effects associated with hacking of systems, which may be detrimental to the objectives of the establishments. DoS is a form of computer hacking that involves disruption of a network system (Hui, Kim & Wang, 2017). DoS is an important topic when it comes to crimes related to hacking into servers because it is the form of attack utilized by hackers to disrupt services within the target network. In this case, the network or server is commanded to authenticate request with wrong addresses.
Literature Review
As pointed out before Denial of Service Attacks (DoS) is a form of hacking in which the attackers assume control of a server or a network system. This is to mean that such attacks prevent the original server usesr from getting the appropriate services by making the server ever busy on authenticating requests with invalid return addresses (Shaar & Efe, 2018). A number of ways have been evolved in order to detect events associated with Denial of Service Attacks (DoS) within networks or servers. Some of the most common strategies employed in the detection of Denial of Service Attacks include activity profiling, change-point detection, and wavelet-based signal analysis (Carl, Kesidis, Brooks & Rai, 2006). However, it is noteworthy pointing out that it is important to combine a number of strategies in the detection process as there is no proven efficient method.
DoS is associated with serious security breaches with unquantifiable implications and some of the recent and famous DoS attacks include GitHub: 1.35 Tbps on Feb. 28, 2018, Occupy Central, Hong Kong: 500 Gbps in 2014, CloudFlare: 400 Gbps in 2014, Spamhaus: 300 Gbps in 2013 and U.S. Banks: 60 Gbps in 2012. Of more significance is that there are a number of measures that can be employed to overcome DoS attacks within servers or network systems. These include expansion of bandwidth to handle spikes in traffic, building redundancy by spreading data across multiple centres, configuring network hardware against DoS attacks, use of anti-DoS hardware and software modules and protecting servers to bringing them offline (Bhattacharyya & Kalita, 2016).
Research Question
The primary research question answered by this proposal is; how to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
In order to answer the study question arising from this proposal, literature search will be conducted from databases associated with studies on information technology. Google search will also be conducted to find cases relevant to the topic of study.
References
Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. CRC Press.
Carl, G., Kesidis, G., Brooks, R.R & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, vol. 10, no. 1, pp. 82-89.
doi: 10.1109/MIC.2006.5
Hui, K.-L., Kim, S. H., & Wang, Q.-H. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. MIS Quarterly, 41(2), 497-A11.
Shaar, F., & Efe, A. (2018). DDoS Attacks and Impacts on Various Cloud Computing Components. International Journal of Information Security Science, 7(1), 26.