Answer to Question #272619 in Electrical Engineering for HARSH KUMAR

Question #272619

In this method while sending the data towards destination a proper method of accepting that data packet is performed so the source known that the data has been received elaborate with diagram and example.[10 marks]


1
Expert's answer
2021-11-30T15:08:02-0500

Research gaps:-

1) In proposed technique for Distibuted Denial of services (DDOS) attack Tool TFN 2K is used under restricted invironment. In future other tools with number of different environments can be experimented to get clearer results.

2) The proposed technique works under intimated domain hence damages under DDOS attacks are not handled realistically.

3) The proposed technique ignored inception of attack reaserchers can work in the direction.


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
APPROVED BY CLIENTS