Free Sample
Potential threats and mitigation tools for Botnet
Solution.pdfAssignment Description
The security remains a challenge in networked information systems. The ubiquity and increasing popularity of the cyber physical systems have made networked devices a powerful amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious software (Malware). Generally, Malware are classified based on their primary traits. One of the primary traits of Malware is Payload capabilities.
“One of the most popular payload of Malware today is software that will allow the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder”[1].
Assume you have an interview for a cyber-security analyst position with Silver Security Solutions company. You are supposed to be prepared about the botnet, their types, threats, and mitigation tools. In this context write a report including the following sections:
-
Introduction about Botnet and its impact on the society. This section must discuss the report outline
-
Discussion of any three variants of Botnet
-
Botnet Architecture
-
Botnet operation and communication
-
Potential threats posed by a Botnet
-
Recommendations on any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools
-
Discussion on any threeNetworked Applications targeted/attacked by Botnet from current literature review
-
Summary
-
References
The Viva voce (oral exam) of the assignment will take place during Laboratory session in Week
8. The student has to answer the viva questions related to the assignment.
[1] M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018.
Assignment Instructions:
-
Do not useWikipedia as a source or a reference
-
Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style.
-
Make sure you properly reference any diagrams/ graphicsused in the assignment.
Marking Criteria for the Assignment 1
Sections No. |
Description of the section |
Marks |
Introduction |
This section must include
|
05
|
Variants of Botnet |
Discussion of any three variants of Botnet
|
08
|
Botnet Architecture |
Explain the Botnet Architecture |
05 |
Operation and Communication |
Discuss Botnet operation and communication. |
05
|
Potential Threats |
Analyse critically any three potential threats posed by Botnet |
09 |
Mitigation Techniques/Tools |
Recommend any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools |
08
|
Networked Applications Targeted/Attacked |
Discuss any threeNetworked Applications targeted/attacked by Botnet from current literature review. |
09 |
Summary |
Summarise the overall contributions of the report |
05 |
References |
style |
04 |
Viva voce |
Viva voce (oral exam) is a hurdle for this assignment. Student must appropriately answer the viva questions related to the assignment. |
12 |
|
Total Marks |
70 |
Example Marking Rubric for Assignment
Grade Mark |
HD 80% + |
D 70%-79% |
CR 60%-69% |
P 50%-59% |
Fail <50% |
|
Excellent |
Very Good |
Good |
Satisfactory |
Unsatisfactory |
Introduction /5 |
Introduction is very well written with very clear background, discussion about the impact of Botnet on the society, and the report outline |
Introduction iswell written with clear discussion about the impact of Botnet on the society, and the report outline |
Introduction is generally presented in good fashion, however missing one element such as the impact of Botnet on the society/ the report outline |
Introduction is presented briefly with some relevance and missing elements such as the impact of Botnet on the society/ the report outline |
Poor Introduction with irrelevant details |
Variants of Botnet /8 |
In-depth and very clear discussion about three variants of Botnet |
Very clear discussion about three variants of Botnet |
Generally good discussion about three variants of Botnet |
Brief discussion about some three variants of Botnet |
Poor discussion with irrelevant information |
Botnet Architecture /5 |
Excellent discussion about the architecture |
Very good discussion about the architecture |
Good discussion about the architecture |
Brief discussion about the architecture |
Unsatisfactory discussion |
Operation and Communication /5 |
A very detailed and very clear explanation |
Very clear explanation |
Generally good explanation |
Brief discussion explanation |
Poor discussion with irrelevant information |
Potential Threats /9 |
A very clear and indepth discussion about potential threats |
Very clear discussion about potential threats |
Generally good discussion about potential threats |
Brief discussion about the potential threats |
Poor discussion about potential threats with irrelevant information |
Mitigation Techniques/ Tools /8 |
An in-depth and very clear discussion about Mitigation techniques/tools and their effectiveness |
Very clear discussion about Mitigation techniques/tools and their effectiveness |
Generally good discussion about Mitigation techniques/tools |
Brief discussion about Mitigation techniques/tools |
Irrelevant discussion about the mitigation techniques/tools |
Networked Applications Targeted/Attacke d /9 |
A very detailed and very clear explanation about three application |
Very clear explanation about three application |
Generally good explanation |
Brief discussion explanation |
Poor discussion with irrelevant information |
Summary /5 |
A section very clearly summarizing the overall contribution |
A section clearly summarizing the overall contribution |
Generally good summary of the report |
Brief summary of the report with some relevance |
Summary not relating to the report |
References /4 |
Clear styles with excellent source of references. |
Clear referencing/ style |
Generally good referencing/style |
Unclear referencing/style |
Lacks consistency with many errors. |
Viva voce /12 |
Answered all the questions appropriately and accurately |
Answered all the questions with some clarity |
Answered all the questions with little in-depth knowledge |
Answered about 50% of the questions. |
Answers were irrelevant |

Get Assignment Help Now...!
Subjects We Offer
- Engineering Assignment Help
- MATLAB Assignment Help
- Mechanical Engineering Assignment Help
- Civil Engineering Assignment Help
- Computer Science Assignment Help
- Electrical Engineering Assignment Help
- Electronics Assignment Help
- Economics Assignment Help
- Management Assignment Help
- Do My Assignment
- Cheap Assignment Help
- Programming Assignment Help
- Law Assignment Help
- Assignment Provider
- Finance Assignment Help
- Python Assignment help
- Healthcare Management Assignment Help
- Computer Network Assignment Help
- History Assignment Help
- Industrial Engineering Homework Help
- IT Management Assignment Help
- Nursing Assignment Help
- Operating System Assignment Help
- Statistics Assignment Help
- Material Science Assignment Help
- Mechanical Engineering Homework Help
- University Assignment Help
- Agriculture Engineering Homework Help
- ATHE Courses Assignment Help
- Capital Budgeting Assignment Help
- BTEC Assignment Help
- HND Assignment Help
- Material Science Assignment Help
- Psychology Assignment Help
- Resit Assignment Help
- Computer Architecture Assignment Help
- Data Structure Assignment Help
- Database Assignment Help
- PHP Assignment Help