Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: June 15th, 2022

Cloud Computing Technology
DOS Attack

Cloud Computing Technology
DOS Attack
Student Name
Department, University

Phase 1: Tools or attacks selection and approval
As technology advances at high speed, some vulnerabilities may be left open to attackers for advantage taking. A Denial of Service (DoS) attack is one of the most common attacks launched on computer systems and occurs more than often in the business world. The attack cripples the network or machine making it inaccessible to consumers or administration [1]. In such a case, a company can lose a lot of money since they are not gaining profit and may have to reimburse clients for inconveniences. What happens is that the attacker floods the targets network with traffic such that necessary signals cannot access the server. Also, the attack may send a message to the server to make it crash. Once this is accomplished, the users of the network will be locked out until a solution is found.
A proposal to DoS is the NMAP 7 to discover vulnerabilities by launching similar attacks. Every hacker owns this tool, and so should computer users who are interested in mitigating the risks faced by their systems. Computer vulnerabilities is a defect in the order that makes the network susceptible to attacks [2]. NMAP 7 is a tool that maps the network by locating hosts and services, giving the user a view of their system. Such a device is loaded with scripts that can be used to DoS and exploit an entity. The NMAP scripting engine allows its users to launch the DoS attacks against their network for testing purposes. The objectives of the tool will revolve around looking for weaknesses in the system that could lead to DoS, testing the company’s ability to identify and respond to DoS attacks, and also check the employee’s awareness to respond to such an attack.
Through the use of NMAP 7, it is possible to streamline mitigation measures for DoS attacks within an organization. The tool will Help in noting the vulnerability areas and creating awareness among employees in the organization [3]. Sometimes, employees may fail to understand what a DoS attack looks like. Carrying out a self-test on the system can be used to set an example to the team hence when a real attack takes place, they react accordingly. As a problem-solving tool, NMAP 7 will optimize the network such that the organization can be more effective and productive at its functions.

Phase 2: Collecting the data
In a typical network, users send authentication requests to the server, and the server returns an approval to the node. However, in a DoS, the user sends multiple requests such that the server cannot approve all of them hence getting locked. This is the same technique NMAP uses to check whether the network is susceptible to attacks. NMAP is a free network mapping solution that can be used by SMEs. The tool is compatible with Mac and Windows. For training, all instructions are documented as there are no personal, online, or webinar sessions. Luckily, NMAP offers support within business hours. The tool provides color codes mapping, icon mapping, reporting, analytics, map exporting, compliance tracking, on-demand mapping, and device auto-discovery.
NMAP 7 can be used to check if a target is vulnerable by running the following command: Nmap –script dos -Pn Through the use of the command, users do not have to execute the DoS attack yet [4]. If there is need to perform a DoS attack, then a user can run the code: Nmap –max-parallelism 750 -Pn –script http-slowloris –script-args http-slowloris.runforever=true Furthermore, if several individuals were all to send packets from NMAP to a target at the same time on high speed it is possible the target could get overwhelmed making it unable to process new requests. If the network has appropriate filters, then the attack should be noticed before it takes place. If the attack takes place successfully, users can know that their system is defective.

Phase 3: Case Study
A case study is given of a hacker known as Evil Jimmy, who used NMAP to penetrate the network of Little Company Network as he tried to interview for a position at the firm [6]. Using NMAP, he was able to get a map of the network and discover where the primary server was located in Washington. He then ping swept the net and identified several computers over the web. He was also able to know which Operating systems were running on which machines. Using this information, Jimmy could see the computer addresses and services open. This made the network system vulnerable for an attack as the networking team took several minutes to realize they were under attack, and several more minutes to mitigate the attack. By that time, Jimmy had already left the building with the information he needed.

Phase 4: Research
1. Abstract
As cloud computing security becomes a big deal in the processing of functions for computer networks today, there is the need to ensure that an organization does not experience a denial of service attack. Cloud computing has achieved milestones in the information and technology world as it opens doors for shared resources and services hence easing the burden of costs on consumers. However, when a network experiences a DoS attack, users may not be able to access these services due to the crippled system. It is essential to look towards solutions such as NMAP to educate on preventive measures against DoS attacks.
2. Introduction
NMAP 7 is a tool that has been used for the longest time to map networks and discover vulnerabilities that may pave the way for DoS attacks. As cases of cybercrimes increase, there is need for organizations to prevent themselves from such attacks. A DoS attack may reflect poorly upon an organization’s reputation hence the need to self-test and intercept an attack before it happens. Through the use of NMAP, it is possible to map the cloud computing network of an organization to minimize vulnerabilities and ensure continued service.
3. The problem statements
A denial of service attack affects not only the functionality of the system but also the financial aspect of a firm. An organization is likely to face bad reputation if it falls victim to a cyber attacker who launches a DoS attack on the network. The problem arises when the system does not have appropriate filters to monitor incoming traffic for attacks. Attempts to solve this problem include the use of self-testing programs such as NMAP, and understanding the warning signs [7]. Some DoS attacks may cripple the system for a short moment while others for more extended periods. It is vital to implement prevention measures as well as countermeasures in case an attack takes place to avoid consequences. This study aims to show the importance of NMAP 7 to discover vulnerabilities and prevent DoS attacks.
4. Why is this tool essential?
NMAP is an essential tool as it offers a way for an organization to close loopholes and minimize attack risks. One of the reasons it is popular is that it provides more network security testing functions apart from DoS launches only. It is also beneficial as it can be used on various operating systems. The primary importance of NMAP7 is the functions it offers, which include: OS detection, Service discovery, Security auditing, and Network mapping [8]. The program is, therefore, able to identify devices on the network, detect their OS, identify hosts on the net, and determine vulnerability based on that information. The network admin can, therefore, decide to use the information given by NMAP 7 to apply patches to the system and close up vulnerabilities.
5. How to use this tool.
The first step is to install NMAP 7 on the OS and proceed to scan the ports. The ports will show up with the OS the server is running. It is vital to know the OS since some DoS attacks are OS-specific. An example is OpenSSH 5.3 which is ancient and vulnerable to attacks [9]. Exploits for OpenSSH 5.3 are publicly available, and hackers can use them to cripple the system. The next step would be scanning IP ranges to determine timing for executing the command. Once the hacker decides on the DoS script, it is possible to exploit the network for vulnerabilities [10]. Results should be stored in the output file if the scripts process NMAP output.
6. The conclusions Phase
In conclusion, cloud computing security can improve its effectiveness through the use of NMAP to mitigate DoS. Through self-testing, not only the hardware and software elements are considered but also the employee aspect. Networking teams must react as fast as possible when they realize they are under attack. Such action will ensure that the aftermath is not harsh on the finance and reputation of an organization.
Phase 5: Presentations
Adequate preparation was done in preparation for delivering relevant to the study of DoS and the NMAP tool. First and foremost, reading through research by other scholars was done intensively to understand the issue of DoS attacks. The topic was chosen to address current affairs in the technology world as every day there are new cases of crimes over the internet. With sufficient information online, an outline was necessary to guide through the writing process. It is fair to admit that the preparation required attention since there are many articles on DoS and NMAP that would have easily diverted from the focus of this paper. Addressing the issue of DoS was vital since people need to understand the importance of knowing how to use NMAP and its significance. Once a person knows the background it is possible to estimate the possibility of mitigating consequences. Preventive measures are necessary since there would have been no point in delivering a problem without solutions.

References
[1] Paloalto, “What is a denial of service attack (DoS) ? – Palo Alto Networks”, Paloaltonetworks.com, 2019. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos. [Accessed: 26- Nov- 2019].
[2] Comodo, “Computer Vulnerability | Types of Computer Security Vulnerabilities”, Comodo News For Enterprise Security, 2018. [Online]. Available: https://enterprise.comodo.com/blog/computer-vulnerability-definition/. [Accessed: 26- Nov- 2019].
[3] M. Rouse, “What is pen test (penetration testing)? – Definition from WhatIs.com”, SearchSecurity, 2018. [Online]. Available: https://searchsecurity.techtarget.com/definition/penetration-testing. [Accessed: 26- Nov- 2019].
[4] “How to Use NMAP 7 to Discover Vulnerabilities, Launch DoS Attacks and More!”, Informationsecuritynewspaper.blogspot.com, 2016. [Online]. Available: http://informationsecuritynewspaper.blogspot.com/2016/02/how-to-use-nmap-7-to-discover.html. [Accessed: 26- Nov- 2019].
[5] “How a ‘denial of service’ attack works”, CNET, 2005. [Online]. Available: https://www.cnet.com/news/how-a-denial-of-service-attack-works/. [Accessed: 26- Nov- 2019].
[6] Whitaker and D. Newman, “Case Study > Penetration Testing and Network Defense: Performing Host Reconnaissance”, Ciscopress.com, 2006. [Online]. Available: http://www.ciscopress.com/articles/article.asp?p=469623&seqNum=6. [Accessed: 26- Nov- 2019].
[7] D. Bojana, “7 Proven Tactics To Prevent DDoS Attacks: Make a Security Plan Today!”, PhoenixNAP Global IT Services, 2018. [Online]. Available: https://phoenixnap.com/blog/prevent-ddos-attacks. [Accessed: 26- Nov- 2019].
[8] M. Ferranti, “What is Nmap? Why you need this network mapper”, Network World, 2018. [Online]. Available: https://www.networkworld.com/article/3296740/what-is-nmap-why-you-need-this-network-mapper.html. [Accessed: 26- Nov- 2019].
[9] Codemopolitan, “Scan Networks for Vulnerabilities With Nmap”, codemopolitan, 2019. [Online]. Available: https://www.codemopolitan.com/scan-networks-with-nmap/. [Accessed: 26- Nov- 2019].
[10] Granneman, “Using Nmap to Scan Networks | Scott Granneman”, Granneman.com, 2019. [Online]. Available: https://www.granneman.com/teaching/websteruniversity/infosecmanagement/auditor/nmap. [Accessed: 26- Nov- 2019].

Order | Check Discount

Tags: best custom paper writing service, best nursing paper writing service, best nursing writing service, best paper writing services, help writing papers for college

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00