Free Essay

Ddos Testing

In:

Submitted By Kingsfall18
Words 1177
Pages 5
Executive Proposal: Security Testing Software for Advanced Research

CMIT 321 7986 Ethical Hacking

Executive Proposal: Security Testing Software for Advanced Research

Information Technology is growing with time and so are the cons associated with it. Security and privacy has become the major concerns for businesses in this IT era. These applications hosted on the web generate different benefits like easy accessibility, fast communication but also create many issues like Denial of Service (DoS), Cross Site Scripting (XSS), Authentication Bypass, etc. These attacks can cause millions in loss for the organization. Therefore, an effective and efficient security software solutions are required so that these attacks can be prevented well in advanced. In this report, a solution is proposed for Advanced Research Company so that it can manage against potential DOS and DDOS attacks. With the rising competition and being in limelight, the company has painted itself a target to its competitors. There have been some scenarios in the past when an attempt was made to compromise the information of the company. GoldenEye software is used for describing the mentioned case. The software will help to identify the DOS attacks. Brief overview of DOS and DDOS attacks Denial of Service is an attack which disrupts the normal functionality of an Information system. The source of the attack may be local or global. Its main aim is the disruption of services so that the targeted service will be unavailable for the users. The DDOS attack is a type of the DOS attack. In this attack, a large number of hosts are utilized to accomplish the required attack. There can be 1000 of hosts involved in this task and they are also known as “bots” or “zombies”. These attacks are of multi-dimensional type because these attacks vary depending on their mode & target (Hudaib).

Executive Proposal

GoldenEye is a straightforward DOS attacking tool. It was created in Python for testing DOS assaults, yet some individuals utilize it as hacking device. This product is appropriated under the GNU General Public License form 3 (GPLv3). GoldenEye is a HTTP/S Layer 7 Denial-of-Service Testing Tool. It utilizes KeepAlive (and Connection: keep-alive) matched with Cache-Control alternatives to persevere attachment association busting through reserving (when conceivable) until it expands every single accessible attachment on the HTTP/S server (Ops). .

Purpose

There are many DoS software tools that can put substantial load on HTTP servers to push them to the edge of total collapse by debilitating asset pools. GoldenEye is the first of the similar software and it is one of the most current that is found in GitHub. You can DoS sites with GoldenEye and cut it down inside 30 seconds relying upon how enormous their memory pool is. Obviously, it won’t deal with secured servers and servers behind a fitting WAF, IDS, yet this is an incredible instrument to test your own particular Web Server for burden testing and correct your iptables/Firewall policies likewise (Mark A. Gregory).

Benefit

GoldenEye works like most otherHTTP Flooders. Both work in comparable ways however GoldenEye's utilizes NoCache and KeepAlive to a huge effect. Additionally, it utilizes an intriguing blend of coordinating Browser, Operating System and Referrers which can make things tricky for the Firewall to identify.

With everything taken into account, it’s a decent instrument to test your own site (with authorization from your Hosting organization), your corporate site and any web application that permits approaching GET or POST ask. Use it to upgrade your Firewall rules, Application Firewall and in this way keep protected from future assaults.

Case Study

GoldenEye is easy to configure and install; one needs to download and unzip the executable file. A dummy test environment was created to test the system with the GoldenEye tool. Following are few of the snapshots of the test environment.

[pic]

[pic]

Figure 1: Attack Snapshots (Ops)

Initially the system had a gigantic pool of free memory and only 11 httpd workers. After the attack, only 101M free memory was available and 174 httpd workers.

It took just 15 seconds to push this server as far as possible. The log file was generated by the tool. Simply taking a gander at the logs, it can be seen that every line contains an alternate GET ask for with diverse strings and sometimes, alludes to BING, BAIDU or some irregular web crawler.

So what happens when your Web Server see's this assault? It breaks down the approaching activity, checks the asked for URL, source address and Referrer and permit it with HTTP 200 OK. Why? Since every program was distinctive.

This device was outlined astutely so that any server would think that every request comes from a single distinctive client attempting to peruse from a IP with diverse programs (Firefox, Chrome, MSIE, Safari and so on.), diverse Operating Systems (Mac, Linux, Windows and so forth.) and they even arrived by means of different referrer. Indeed, perhaps the asked for URL was wrong, yet an ordinary Web Server would either permit it, divert it to a mistake page with all while the association being left open (i.e. Apache laborer/attachment). A standard web server generally permits X number of simultaneous clients from the same IP, and with that numerous open association/utilized attachment, this sort of assault puts a substantial weight on the server and any consequent clients gets a mistake (HTTP 503 or comparative). So the assailant with a couple of arbitrary intermediary/VPN, can debilitate server assets rapidly. (N.Ch.S.N. Iyengar).

Cost Analysis

This is a free tool and can be used for the research and testing purpose. The results can be analyzed by viewing the log files. After its successful execution and testing, the organization can look for implementing similar tools for advanced testing purposes.

Impact of Software on Production Environment

Following suggestions can be considered when working on the Production Environment.

• Lower every IP association (normally it 300 every IP for Apache)

• Alter association every IP limit.

• Incapacitate KeepAlive and lower Connection Timeout settings (default is 300)

• In case you're facilitated on a Shared server, contact SysAdmin. In the event that they can't guard this basic assault, simply relocate to a superior facilitating organization.

• Utilize a Web application Firewall (WAF).

• White-rundown approaching inquiries and this assault will have no influence on your server.

• NGINX and Node.js appears to work better against these sort of assaults.

References

Hudaib, Adam Ali.Zare. "he Principles of Modern Attacks Analysis for Penetration." International Journal of Computer Science and Security (IJCSS), Volume (9) : Issue (2) (2015): 22-84.

Mark A. Gregory, David Glance. "Hacking." Mark A. Gregory, David Glance. Security and the Networked Society. Springer International Publishing, 2013. 3-49.

N.Ch.S.N. Iyengar, Arindam Banerjee and Gopinath Ganapathy. "A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment." International Journal of Communication Networks and Information Security (IJCNIS), Volume 6, No 3 (2014): 233-245.

Ops, blackMORE. DoS website with GoldenEye – Layer 7 DoS tool with KeepAlive NoCache. 22 November 2014. 10 May 2015 .

Similar Documents

Premium Essay

Project Manager

...from volunteers who couldn't use the app or the back-up phone system. He revealed that usernames and passwords were wrong, and the reset password tool didn't work either, which meant they couldn't change phone PINs. "The primary issue was we beta-tested in a different environment than [headquarters Boston Garden]," he told the website. "There was so much data coming in -- 1,200 records or more per minute -- it shut down the system for a time. Users were frustrated by lag, and some people dropped off and we experienced attrition as a result." Working primarily as a web developer, I had some serious questions. Things like "Has this been stress tested?", "Is there redundancy in place?" and "What steps have been taken to combat a coordinated DDOS attack or the like?", among others. These types of questions were brushed aside (truth be told, they never took one of my questions). They assured us that the system had been relentlessly tested and would be a tremendous success. Read more: http://www.businessinsider.com/romney-project-orca-disaster-2012-11#ixzz2zbMrUbex Now a note about the technology itself. For starters, this was billed as an "app" when it was actually a mobile-optimized website (or "web app"). For days I saw people on Twitter saying they couldn't find the app on the Android Market or...

Words: 1456 - Pages: 6

Premium Essay

Medical

...MEDICAL SHOP MANAGEMENT SYSTEM A mini project submitted to the Bharathidasan University in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS Submitted by N.RAJA RAHINAM Register Number: 4CA104236 Under the guidance of Miss.A.Sathya, M.C.A., M.PHIL., Assistant Professor DEPARTMENT OF COMPUTER APPLICATIONS BISHOP HEBER COLLEGE (AUTONOMOUS) (Nationally Reaccredited at the A+ Level by NAAC) (Recognized by UGC as “College with Potential for Excellence”) TIRUCHIRAPPALLI-620 017 NOVEMBER – 2012 DECLARATION I hereby declare that the mini project work presented is originally done by me under the guidance of Miss.A.Sathya MCA., M.phil., Assistant Professor, Department of Computer Applications, Bishop Heber College (Autonomous), Tiruchirappalli-17 and has not been included in any other thesis/project submitted for any other degree. Name of the Candidate : N.RAJARATHINAM Register Number : 4CA104236 Batch : 2010-2013 Signature of the Candidate Miss.A.SATHYA MCA., M.PHIL.,, Assistant Professor Department of Computer Applications Bishop Heber College (Autonomous) Tiruchirappalli – 620017. Date: CERTIFICATE This is to certify that the mini project work entitled “MEDICAL SHOP MANAGEMENT SYSTEM” is a bonafide record work done by N.RAJARATHINAM, Register Number: 4CA104236 in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS...

Words: 2693 - Pages: 11

Premium Essay

Manager

...Technology professional with extensive background in QA engineering, Project Management and Scrum Master. • Improve software quality, meet customer expectations and reduce defects by supporting proven software quality practices and implementing practical and effective process improvement methods. • Plan and perform effective software testing through a combination of familiar structured test techniques, rapid test practices and test automation where applicable. Experience Summary: ✓ Sound Experience in Full Software Testing Life Cycle (Involvement in Test Strategy, Test cases, Test Scripts/Data, Defect tracking/prevention) and its most of phases e.g. Unit Testing, Functional Testing, Regression Testing, Integration Testing, System Testing and User Acceptance Testing, Ajax Testing. ✓ Adherence to software development life cycle, quality methodologies (ISO 9001/CMM) and best practices of software testing models (Agile Methodology). ✓ Expert in both Manual testing and Automated testing Using tools Selenium - Java. ✓ Experience in Functional & GUI testing in CRM and ERP domain. ✓ Experience in Database Testing (MySql). ✓ Successfully Participated in 32 hrs training on automation tools such as Mercury Interactive Quick Test Pro 9.2, Test Director (QC). ✓ Solid communicator with exceptional team-building skills. ✓ Strong problem-solver, design solutions and assist developers with issues. Employment History: • Over all experience...

Words: 1430 - Pages: 6

Premium Essay

Voices Not Heard

...Amber Jacobson M. Cook 16 November 2012 English 1301.30 E4, Persuasion Voices Not Heard Seeing the face of a helpless animal can break your heart. Many animals go through torturous testing on a day to day basis that they cannot help, nor can they defend themselves. Since Ancient Greek times, animals have been undergoing cruel and inhumane medical testing that should not be done for the benefits of the human race. Animal testing is wrong because it is cruel, costly, harmful to animals, unreliable, and outdated. Animal testing has been around since the times of the Ancient Greeks. Between seventeen million and twenty-two million animals are used for biomedical research each year (Leepson). Many believe that animals do have rights, and there are many organizations out there to trying to ensure their safety and help them get out of the horrible treatments they endure. For example, the ASPCA, American Society for the Prevention of Cruelty to Animals, has been around since 1866 trying to curb the gruesome treatment of humans to animals. The ASPCA tries to prevent the abuse and neglecting of animals around the nation. They set up shelters for animals and they give vaccines and anything else they may need. The different types of animals being tested are endless; from mice to sheep, they all serve their own purpose in the medical field. Even though these animals have helped scientist break through some medical mysteries, it is still inhumane how they have to suffer in...

Words: 1391 - Pages: 6

Premium Essay

Ethics in Psychological Research

...concepts of the ratio of the benefits and risk, and defining ethics of the use of animals in research. Animal research is a topic which is ethically sound and a concerning manner to researchers of the psychological field. There are issues of tests run on the animals which are controversial in manner and a part of the (APA) American Psychological Association ethical issue. The APA is a organization for psychologists in the United States, and designs rules and guides the profession of psychologists as well as other medical personnel. The impact of the testing of animals in the research of psychology will be included in the discussion. Ethics in Psychological Research Paper Animals in Research Ethics help guide researchers around ethical dilemmas that may arise when conducting research. Example questions would be is it acceptable to avoid telling the participant of a study as to what the researcher is looking for and testing about? In what instances is it acceptable and when is it not? The development of research ethics helps guide researchers to find the necessary answer to the different question types (Shaughnessy, Zechmeister, & Zechmeister, 2009). Conducting a scientific research is when researchers look for facts, try to prove theories, and declare the findings the truth, and those conducting research must use the ethics guidelines (Shaughnessy, Zechmeister, & Zechmeister, 2009). The research study or projects could be a loss if the start of the research begins...

Words: 1175 - Pages: 5

Premium Essay

Peta

...the organization first caught the public's attention in the summer of 1981 during what became known as the Silver Spring monkeys case, a widely publicized dispute about experiments conducted on 17 macaque monkeys inside the Institute of Behavioral Research in Silver Spring, Maryland. The group first came to public attention in 1981 during the Silver Spring monkey’s case, a dispute about experiments conducted by researcher Edward Taub on 17 macaque monkeys inside the Institute of Behavioral Research in Silver Spring, Maryland. (Eldercare Home Health, 2012) The case led to the first police raid in the United States on an animal laboratory, triggered an amendment in 1985 to the United States Animal Welfare Act, and became the first animal-testing case to be appealed to the United States Supreme Court, which upheld a Louisiana State Court ruling that denied PETA's request for custody of the monkeys. Pacheco had taken a job in May 1981 inside a primate research laboratory at the Institute, intending to gain firsthand experience of working inside an animal laboratory. Taub had been cutting sensory ganglia that supplied nerves to the monkeys' fingers, hands, arms, and legs, a process called "deafferentation" so that the monkeys could not feel them; some of the monkeys had had their entire spinal columns deafferented. He then used restraint, electric shock, and withholding of food and water to force the monkeys to use the deafferented parts...

Words: 2368 - Pages: 10

Premium Essay

Animal Testing: Pros and Cons

...Animal Testing Introduction The application of animals to test a large number of products from household compounds and cosmetics to Pharmaceutical products has been considered to be a normal strategy for many years. Laboratory animals are generally used in three primary fields: biomedical research, product security evaluation and education. (Animal Experiments) It has been estimated that approximately, 20 million animals are being used for testing and are killed annually; about 15 million of them are used to test for medication and five million for other products. Reports have been generated to indicate that about 10 percent of these animals are not being administered with painkillers. The supporters of animal rights are pressurizing government agencies to inflict severe regulations on animal research. However, such emerging criticisms of painful experimentation on animals are coupled with an increasing concern over the cost it would have on the limitation of scientific progress. (Of Cures and Creatures Great and Small) Around the world, animals are utilized to test products ranging from shampoo to new cancer drugs. Each and every medication used by humans is first tested on the animals. Animals were also applied to develop anesthetics to ease human ailments and suffering during surgery. (Animal Experiments) Currently, questions have been raised about the ethics surround animal testing. As a result several regulations have been put in place to evaluate and control the...

Words: 3584 - Pages: 15

Premium Essay

Testable Code

...How to write: Clean, Testable code Psychology of Testing (or why our intuition of testing is wrong) -- Miško Hevery http://goo.gl/V0aWx Testing is not like frosting Micro Development Model Develop Check-In Test automate Development Model Software Engineers Develop Design Testing magic QA Manual Tests Exploratory Tests Test Engineers Automated Tests Tools Testing magic Excuses Valid Excuse Legacy code-base Don’t know how I write UI “Dirties Design” No Tests Testing is for QA It doesn’t catch bugs It’s slower It’s boring Too many interfaces Hard to change Common Misconception How do you write HARD TO TEST code? Less Theory more Hands-on http://www.flickr.com/photos/doozzle/149885028/ Imaginary Interview Your mission, should you chose to accept it, is to make this code testable ● I did not say understand what it does ● I did not say write a test http://bit.ly/92Ozrz public class InboxSyncer { private static final InboxSyncer instance = new InboxSyncer(Config.get()); public static getInstance() { return instance; } private final Certificate cert; private final String username; private final String password; private long lastSync = -1; private InboxSyncer(Config config) { this.cert = DESReader.read(config.get(“cert.path”)); User user = config.getUser(); this.username = user.getUsername(); this.password = user.getPassword(); } public sync() { long syncFrom = lastSync; if (syncFrom == -1) syncFrom...

Words: 1253 - Pages: 6

Premium Essay

Resume

...OBJECTIVE To obtain a challenging growth oriented position where I can prove my worth to the Organization with my technical knowledge in a supportive environment. PROFESSIONAL EXPERIENCE |PERIOD |ORGANIZATION |DESIGNATION | |July 2007 – Till Date Technologies Limited |Senior Systems Engineer | SOFTWARE PROFICIENCY |Web Technologies  |HTML, XML | |Script |PERL Scripting,Java Scripts | |RDBMS/DBMS |Oracle 9i | |IDE’s |Eclipse, NetBeans | |Languages |C++, SQL, PL\SQL, Visual Basic and JAVA | |Operating System |Windows XP, Windows 95/98, & UNIX | |PLM/PPM Packages |Windchill/Planisware 5 ...

Words: 431 - Pages: 2

Premium Essay

Introduction to Testing

...IBM, Bangalore A White Paper Challenges of Managing a Testing Project: (A White Paper) A White Paper Page 1 of 20 Vinod Kumar Suvarna IBM, Bangalore A White Paper Introduction Testing is expected to consume 30 – 50 % of the Project Effort, Still properly managing testing project is not considered seriously. Project Managers always undermine the impact the testing activity has on the Project Cost and Schedule. Hence the testing activity is usually unplanned and uncontrollable. As the project manager assumes that the main focus of the testing activity in the project is not to meet the project schedule. But Its is a reality that a thorough and close monitoring of the Testing project is required to increase productivity, reduce cycle -time and improve quality. Below pie chart depicts the Project effort distribution by phase for a development project, where independent testing team performs the testing activity. Project Effort Distribution by Phase 21 35 Requirement Design Code & Unit testing Testing 25 19 A White Paper Page 2 of 20 Vinod Kumar Suvarna IBM, Bangalore A White Paper The Problem / Issues / Improvement Opportunity in Hand: Ask a Tester ‘Why he/she needs to burn midnight oil to churn a Quality Product?’ Answer is obvious ‘Needs to put extra time and effort to overcome the Project schedule slippage ‘ Ask a Project Manager ‘Why the Project is in trouble during the last phase?’ Answer is obvious ‘Not Sure, Did not anticipate...

Words: 2954 - Pages: 12

Premium Essay

Doc2. How Much of Apple's Success Can Be Linked Directly Back to Its Culture? Why?

...Paper Presentation on Cloud Functional Automation Testing Pavan Kumar Vangala Kalyan Pallapolu Software Engineer Senior Software Engineer Bibliography Pavan Vangala is working as a Software Engineer is having 5+Years of experience in Manual and Automation testing. Good Communicator and trained the members on automation tool (QTP). ISTQB Certified Professional. Kalyan Pallapolu is working as a Senior Software Engineer is having 6+Years of experience in Manaul and Automation testing. Expertise in Functional Automation using QTP. Handled different teams and having good management Skills Contents Abstract Keywords 1 2 3 4 5 6 7 8 9 10 4 4 4 4 4 5 5 6 7 8 8 8 Introduction- Cloud Computing About Cloud Testing Resource Sharing Functional Testing Functional Automation Apply Cloud Testing to Functional Automation Benefits Concerns Conclusion References Cloud Functional Automation Testing Abstract The Purpose of this Paper is to discuss the implementation of Cloud technology for Functional Automation Testing to overcome the challenges for environment setup, resource Utilization and to reduce cost in terms of Utilities, Infrastructure and other factors involved in day to day software development. Also the advantages and disadvantages of cloud Testing in real world and how the Organizations are benefited by adopting the Cloud Computing Technology. Keywords Cloud Computing, Cloud testing, Functional Automation 1. Introduction -Cloud Computing: Cloud Computing comes...

Words: 1605 - Pages: 7

Premium Essay

Animal Testing

...English 240 December 16, 2011 Should Animals be used for Research During the past ten years, a major controversy over the use of animals in biomedical and behavioral research has arisen. The debate about using animals for medical testing has been ongoing for years. The struggle is usually between animal rights activists and scientist. I believe that animal testing is imperative to the progression of medical cures, procedures and drugs. Scientists have been solving medical problems, developing new techniques and treatments, and curing diseases by using animals in biomedical research. Animal rights advocates believe that animals should not be exploited by humans, and that animals have the same rights as humans. Anti-vivisectionists oppose the use of animals in medical research. They believe that medical researchers are cruel and inhumane. Animal Welfare does not oppose all use of animals in research. They oppose inhumane and unnecessary use of animals and fight to eliminate pain and suffering of animals. On the Contrary, scientists argue that animal research is necessary because it helps them develop medications, vaccines, or new procedures to treat or prevent diseases for both humans and animals. Most research projects either do not involve pain or the pain is alleviated with analgesic or anesthetic drugs. They understand that pain causes stress for the animals, and this stress can seriously affect the results of the study. With all these controversies about this...

Words: 2692 - Pages: 11

Premium Essay

Bsa375

...Service Request SR-rm-004 - Analyze HR System- Part 3 University of Phoenix BSA/375 Fundamentals of Business Systems Development Your Instructor’s Name Date: System Implementation The implementation stage of the Riordan project may prove to be the most challenging yet, but one that is worth all the effort. It would take a team of experts in various fields to successfully see this stage successfully through to completion, it cannot be a one-man show. Several departments within the organization have to be given priority when it comes to rolling out the new human resource management system. Since this system is automated and rests on an Information Technology platform, the first two departments to consider would be the human resource management and Information Technology departments. All the teams of professionals within these departments would have to be part and parcel of the entire system design and development process. The other departments to consider would be those of finance and operations management as they too are a fundamental part of the organization’s decision making framework. Coding As the new human resource management system is designed for Riordan Manufacturing, it is imperative to consider all its essential features and functions so as to ensure a flawless module is developed. These features and functions are tied firmly to computer programs for end users as well as those for system administrators. Databases for...

Words: 1472 - Pages: 6

Premium Essay

Bimedical

...Name: Tutor: Course: College: Date: Animals in Biomedical Research From history, man depends on animals for survival, either as mode of transport or source of food. However, animals are used for many other purposes in the current world. Scientists are using animals for experimenting and testing drugs that prescribed to cure many diseases, for instance, HIV/AIDS. For many years, animals’ experiments have been used to discover new ailments and the drugs that could cure them. However, there are so many organizations that are trying to fight for animal rights by preventing animal experiments. Stopping the use of animals for scientific research can hinder progress in new findings and discoveries in the health sector. Animals have been used for scientific research because their body functions are almost similar to that of human beings. Human suffering should be drastically reduced as a first priority by ensuring that the humans don’t die because simple and treatable diseases. Animal suffering and death should come as a second priority after taking care of humans needs. Scientists should be able to use animals for research to prevent any possible deaths in human beings. Disease like tumors can be experimented and tested on animals and not on man to avoid suffering of human beings. Health of human beings has advanced due research carried out on animals. Major killers like diabetes heart attack and cancer have been treated well due to improved medicine. Some diseases mostly...

Words: 1150 - Pages: 5

Free Essay

"Terrorist Activity" in Austria

...People's Friendship University of Russia Department of International Relations Student: Stefan Unertl Student-ID: 1032115182 Research paper „Terrorist activity“ in Austria The Association Against Animal Factories (VgT – Verein gegen Tierfabriken) and its struggle for animal rights by Stefan Unertl Moscow, December 2011 Table of content 1. Introduction 2. The Association Against Animal Factories (AAAF) and its activities in Austria and 2.1. The AAAF against Kleiderbauer 3. The trial 4. Outcome/Conclusion 1. Introduction The Association Against Animal Factories is a non-governmental organization which is active not only in Austria but also in Switzerland and has good connections to the worldwide animal rights association, PeTa. Its main goal is to improve animal rights in Austria. Their work is dedicated to the reduction of exploitation or abuse of animals. Due to their ongoing activities, the association has to face many difficulties in Austria. Not only that their actions of protest are supervised by the police but also that every organization, like an NGO, can be convicted as a “criminal organization” based upon the paragraph 278a in the Austrian criminal code when this organization is supposed to commit frequently acts of violence or has a structure resembling it to a criminal organization (Mafia, etc.). Due to this vague article it had been criticized by many people not only in politics but also in the population. The first time this article gained unintentionally...

Words: 1352 - Pages: 6