Free

Computer Science - Essay Example

Comments (0) Cite this document
Summary
The author of the following text entitled "Computer Science" focuses on the issues of computer science. Thus, it is stated here that Dos attack classification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Computer Science
Read TextPreview

Extract of sample "Computer Science"

COMPUTER SCIENCE Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades there has been no study on the DDos attacks and therefore there is not much understanding on the same. This is because there is insufficient data at the backscatter. According to Kumar, there are some articles that have scrutinized the hosts that have been contaminated with the worms. This has been done through examination of the structure and the properties of the worms. This has been instrumental in the classification.Mandia and Prosise categorized the DDos attack into three distinct groups. These groups include Destructive, Resource consumption, and Bandwidth consumption attacks. On the other hand, Douligeris and Mitrokotsa advanced the classification to five groups which included Network OS level, Device level, Application level, Data flood, and Protocol feature attack. This can be explained below:
1. Bandwidth-based attacks
This often attacks the routers, servers and firewall processing resources and thus limiting them. Normaly, this type of DDoS attacks sent a lot of data which leads to an overload making the network brandwidthto be depleted. There is reduction in the quality of service when there is an overload attack in a system. This is because the normal access is tempered with.
2. Traffic-based attacks
This kind of attacks often sent large traffic attacks in form of TCP, UDP and other ICPM.Often people use technology forgery to escape the system monitoring. When the attacks are mixed with the malware exploitation, they cause leaking of the information and this may be dangerous. This illegal activity of information leakage will occur while fighting the DDoc attacks.
3. Application-based attacks
This is vital as it is used in the financial institutions to prevent breaches and leakages of the information. Though the attackers may not be many, this attack is taken for specific roles such as cancelling fraudulent transactions or accesses a vital database. (Chai, 2013)This often involves targeting application layer of OSI model.Normaly, application layer data is sent to the attackers to disable their functions.
4. Modus Operandi
Here, there is the involvement of a machine which in most cases are the agents. When the orders are received from the master machine which is controlled by the attacker, this agents will be involved in remitting the packets to a host who is a victim of the attack. The agents and master will then generate an actual attack message instructing the modus operandi to attack the network victim. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Science Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1699953-computer-science
(Computer Science Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1699953-computer-science.
“Computer Science Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1699953-computer-science.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Science

Computer Science

...Personal Statement - Computer Science I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers were not introduced to the fullest at the time of its inception and were considered wholly as a luxury instead of a necessity, it was curiosity plus a self-driven need to learn about this new technology. My interest in computer sciences dates back to my school days. My first instance with a computer was in my mid-school where I got a chance to play games on it. High schools in my town at that time did not offer computers as a subject for...
4 Pages(1000 words)Personal Statement

A Computer Science Life

...?A Computer Science Life As a Computer Science major, I would get to know a great deal about life in general. I will explore the basis of life as it is, and discern how things shape up within the world of technology and its environs. I would explore how the world of technology is fast changing, and what are its different avenues where growth and development could easily be understood. I would aim to know the people who are the movers and shakers within the world of computer science and technology and would therefore try my best to be one step ahead of how they shaped up their lives and what they did in essence to reach the respective...
3 Pages(750 words)Research Paper

Chemistry and Computer Science

... Chemistry, Computers and Computer science Chemistry has a relation with every aspect of the life that deals withthe matter. Matter is everything around us. It can be solid, liquid and gas. The more in-depth study suggests that human bodies and natural processes are also dependent on the chemicals and chemical reaction to sustain. Moreover our cars and power generation units convert chemical energy in fuel to a more useable form. Chemistry has a deep relation to the computers and computer technology. The way we moved towards the more energy efficient electrical and electronic products depicts that generation after generation, the knowledge about the utilization of chemistry enhanced in huge amount. Computer is nothing but a bulk... by a...
3 Pages(750 words)Research Paper

Computer Science Information System

...Case Study: of the Situation: From the case study of a fitness center, we derive at the following assumptions There are 5 centers around the metropolitan. 2. There are in total 650 members and 30 members at each location. 3. This system will be used by both members and fitness consultants to track participation in various fitness activities, such as free weights, volleyball, swimming, stair climbers, and yoga and aerobic classes. The DSS system will be implemented in the form of a client server model with an interface, possibly a computer visual display unit, at all the five centers and will act as a platform to the prospective and current members and consultants. They are able to access the required information...
3 Pages(750 words)Essay

Computer Science Assignment

...Running head: DECKER REPAIRS CASE STUDY AND ANALYSIS. Decker Repairs Case Study Project Planning and Analysis Partha kar 25th April 2007 Abstract This dissertation is about planning and analysis of Decker Repairs. The system analysis is performed and all changes are proposed. It starts with the case analysis, company analysis, current situation, current system employed and associated problems. It explores in to identifying opportunities to improve the present situation and suggests a suitable computer Information system required to envelope all the deficiencies with the present system. Thirdly, all the functional and non-functional requirements are identified. A Data Flow Diagram is provided which illustrates the...
12 Pages(3000 words)Assignment

Computer Science

.../321957-321957-64295-306995-306995-3355644.html HP Pavilion a6500z series .http://www.shopping.hp.com/webapp/shopping/computer_can_series.dostoreName=computer_store&category=desktops&a1=Category&v1=Everyday+computing&series_name=a6500z_series Choosing a PDA versus a Laptop. (2007). Retrieved july 30, 2008, from http://www.googobits.com/articles/1019-choosing-a-pda-versus-a-laptop.html roseberry, catherine. (2008). Laptop or PDA for Business Trips. Retrieved july 30, 2008, from http://mobileoffice.about.com/cs/packyourgear1/a/laptoppda.htm Heather, booth., & Brown, murray. (n.d.). Basics of computer science. Retrieved july 30, 2008, from http://www.cs.utk.edu/modules/acknowledgements.html... 1. Write a short report with examples to show how a...
13 Pages(3250 words)Essay

Computer Science

...changes (Ambler et al., 2007). The next confront for the traditional Software Engineering is: How do we proffer effortlessness and visibility into SE actions? Incorporating and supporting the transparency and visibility in the Software Engineering is really hard and delicate (Williams et al., 2003). Agile Software Engineering makes use of and pays more stress on the teamwork and in-group collaboration. This attribute of the Agile Software Engineering makes it capable to counter this confront of the conventional Software Engineering. Next we have the challenge: How could software engineering reveals that it would be able to track paramount practices in management science? Software Engineering is more than a project...
10 Pages(2500 words)Essay

Computer Science

... ≥ 0.5 then y = y + 1 error = error - 1.0 THE PIXEL DUPLICATION This is the simplest approach to solving the resolution problem. It is majorly used for drawing curves with slopes between −1 and 1. Each pixel both below and above are drawn thus resulting in a curve that has a thickness of 2n+1 pixel in the y axis (Drawing Lines and Curves (Introduction to Computer Graphics Using Java 2D and 3D). It works better for thinner lines. In this algorithm the pixels are duplicated in columns for the lines with – 1 < slope < 1 and in rows for all other lines . This results in lines that are vertical or horizontal towards the end thus displeasing for thicker lines as illustrated below... ...
4 Pages(1000 words)Lab Report

Computer Science

.... (1128 words) References Brown.edu, (2015). A Framework for Making Ethical Decisions | Science and Technology Studies. [online] Available at: http://www.brown.edu/academics/science-and-technology-studies/framework-making-ethical-decisions [Accessed 3 May 2015]. Velasquez, M., Andre, C., Shanks, T. and Meyer, M. (2015). Calculating Consequences: The Utilitarian Approach to Ethics. [online] Scu.edu. Available at: http://www.scu.edu/ethics/practicing/decision/calculating.html [Accessed 3 May 2015].... and Morality Introduction Morals and Ethics can have a philosophical impact on thechoices individuals make on ...
4 Pages(1000 words)Coursework

Computer Science and IT

...Computer Science and IT A computerised accounting system is an accounting information system that processes the financial transactions and events as per the accounting principles and standards to generate reports as per user requirements. The computerised accounting system has two main aspects that include accounting principles and a user defined structure for the upkeep of records and production of reports. (Kiely, 2015).There is a requirement to create innovative products and services to respond to the variable customer routines and their demographics. The intense competition among banks calls for a steady refurbishment of the banking activities to ensure customers enjoy quick and efficient services. An improved service through... ...
4 Pages(1000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Science for FREE!

Contact Us