Question? Call Us  +1 (817) 546-4770

CYBR 371 System And Network Security

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

CYBR 371 System And Network Security

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

CYBR 371 System And Network Security

0 Download6 Pages / 1,278 Words

Course Code: CYBR371
University: Victoria University Of Wellington is not sponsored or endorsed by this college or university

Country: New Zealand

Write the Recommendations for mitigating ARP poisoning attack.

Network attack with appropriate tools or techniques

IP spoofing attacks –

For this attack Ubuntu is used for conducting the IP spoofing attack and two virtual machine is used as the targeted machine.
Recommendation for the following attacks
Recommendations for mitigating IP Spoofing attack
For the prevention of the IP spoofing attacks it is important to identify the attack and different tools and techniques can be deployed for reducing the threat of IP spoofing attacks such as:
Application of Packet Filtering: the data packets should be inspected when they are transmitted between the different addresses in the network. It can help in preventing the IP spoofing attacks because the conflicting sources of IP address can be blocked and it can be traced for tracing the source of the IP spoofing attack.
Avoidance of trust relationships: The protocols that are dependent on the trust should not be used because it can be used by the attacker for proceeding with the spoof attack. The trust relationship is dependent on the IP address for the establishment of the relationship and thus the IP address is available to the attacker.
Utilizing spoof detection software: Application program can be used for the detection of the spoofing attack. The data that is transmitted are inspected by the spoof detection software and certified. The certification is checked for blocking or allowing the data that seems to be spoofed.
Application of cryptographic network protocol: The transport layer security protocol, secure shell, HTTPS and the other protocols used for communication with the other user can increase the efficiency for the prevention of the spoofing attack. This can be done by encrypting the data before they are sent to the different destination address in the network.
Recommendations for mitigating ARP poisoning attack
The ARP cache poisoning attack is used by the attacker for gaining the access of the victim machine and monitor the communication between the victim device and the device with which the victim is communicating. This is used for viewing the information that is passed between the two devices. There are different solution that can be used for the mitigation of the ARP spoofing attacks such as:
ARP authentication – The ARP protocol is modified for not processing the ARP packets if there is no predefined cryptographic code S-ARP and TARP. But there are some incompatibility issues faced by the device as some the device can operate using standard ARP protocol.  
Patching of the operating system – Patching the operating system would help in prevention of the ARP spoofing and there are different techniques needed for patching the kernels of the operating system. Problem might arise during communication with different kernels and anticap or antidote should be used for resolving the ARP spoofing problems and patching the operating system kernel.
Dynamic ARP inspection – There are some switch that contains security feature such as DAI for stopping spoofing of ARP. It has the ability to intercept the response and the ARP request for dropping all the invalid MAC to IP mapped packets.
ARP mitigation tool – Software tools are used for the mitigation of the ARP spoofing attacks and some of the application can also help in detection of the attack. Some of the example of the ARP mitigation tool are ARP watch, NoCut, AntiARP, etc.
Mapping of the ARP – It is the most efficient approach for the prevention of the ARP spoofing attacks but it cannot be used for large area network where DHCP configuration is used because there is a frequent change of the IP address. NIDPS and DAPS are used for the management of the static entries of the ARP.
Recommendations for mitigating DoS attack
Access control list can be used for the mitigation of the DoS attacks where a set of rules are applied for controlling the permission of accessing the network device. The traffic needs to be monitored and controlled for eliminating the risk of denial of service attacks. The rate limit can also be applied for the implementation of the threshold limit on the traffic flowing in the network. This method is used by the data providers for the protecting their network device from permanent denial of service. How much should enter or go out of the device should be decided by the network administrator and the rate should be dependent on the processing capacity of the server. The combination of the rate limit and the access control mechanism can help in improvement of the effectiveness and blocking the bad traffic and give the full access of the bandwidth to the legitimate traffic. The traffic entering the router should be denied to pass through the router interface and the server response time should be measured for shooting the duration of the attack. The insertion of the command line tool with the use of the SSH protocol can also help in mitigation of the DoS attack. There are different powerful tools developed in Linux platform that are used for communicating with the live application. The scripts are constructed for the management of the interactive system that can run without the interaction of the user. A logical loop should be designed using the shell coding and it is used for maintaining a constant rate of the network traffic for the server.   
Bandwidth monitor can be used for the measurement of the consumption of the bandwidth and analyse the performance of the network. The performance of the network can be analysed based on the response time of the server, download time from the website and the round trip time. A network monitoring tool such as wireshark, PRTG network monitoring tool, etc. can be used for monitoring the network and it should be used for measuring the distributed denial of service. The time curl can be used for the identification of the response time of the server and measuring the time taken by the server for processing the request of the user. The use of Apache benchmarking tool can be a solution for the management of the performance of the Apace HTTP servers. 
Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and an Ethernet-based network security monitor.
Fisher, R., Ledwaba, L., Hancke, G., & Kruger, C. (2015). Open hardware: A role to play in wireless sensor networks?. Sensors, 15(3), 6818-6844.
Gong, M. X., Hart, B., & Mao, S. (2015). Advanced wireless LAN technologies: IEEE 802.11 ac and beyond. GetMobile: mobile computing and communications, 18(4), 48-52.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Lee, I. E., Guo, Y., Ng, T. K., Park, K. H., Alouini, M. S., & Ooi, B. S. (2017, July). Bandwidth enhancement of wireless optical communication link using a near-infrared laser over turbid underwater channel. In Lasers and Electro-Optics Pacific Rim (CLEO-PR), 2017 Conference on (pp. 1-5). IEEE.
Mansfield-Devine, S. (2015). The growth and evolution of DDoS. Network Security, 2015(10), 13-20.
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743). Upper Saddle River, NJ: Pearson.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.
Wu, Y., Qian, L., Mao, H., Lu, W., Zhou, H., & Yu, C. (2017, September). Joint Channel Bandwidth and Power Allocations for Downlink Non-Orthogonal Multiple Access Systems. In Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th(pp. 1-5). IEEE.
Zaalouk, A., Khondoker, R., Marx, R., & Bayarou, K. (2014, May). Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions. In Network Operations and Management Symposium (NOMS), 2014 IEEE (pp. 1-9). IEEE.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 6 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). CYBR 371 System And Network Security. Retrieved from

“CYBR 371 System And Network Security.” My Assignment Help, 2021,

My Assignment Help (2021) CYBR 371 System And Network Security [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘CYBR 371 System And Network Security’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. CYBR 371 System And Network Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Looking for top-notch term paper writing service? can be the best choice for you. We have the finest team of 5000+PhD expert writers who provide you with unmatched assistance. Whether you are pursuing Marketing, Law, Nursing, English, and the likes, you will always receive a well-crafted term paper format. From offering you unwavering assistance in drafting an essay outline to conclude on a strong note; we have got it all. What more, we provide you with brilliant samples absolutely free which will help you in understanding how to write a term paper. To know more, have a word with 24*7 active customer support team.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »