TBD

Posted: August 26th, 2021

TBD
Name
Institutional Affiliation

TBD
The “Great Cannon” is an offensive system developed to facilitate the launching of a distributed denial-of-service (DDoS) attacks for the purposes of enforcing censorship. It works by sending massive traffic on Chinese anti-censorship projects that are hosted on the targeted site. The Great Cannon has unique designs and capabilities. Primarily, the system is designed such that it hijacks the traffics being transmitted to a particular Internet Protocol (IP) addresses. At the same time, it has the capability to replace the existing encrypted content by simply locating between the end-user and the Web server. This is referred to as the man-in-the-middle attack. Thus, it was developed by China to manipulate system traffics outside the country by programming the browsers in the background to create DDoS attacks.
The plan to identify sites associated with GIAC attacks first involves scanningthe system to identify vulnerabilities. Scanning can be done using Nessus, which checks several hosts and compares results against dynamic databases. Secondly, determine the best way you can run both the client and server systems to maximize packet filtering. Thirdly, install the Nessus system, either through straight installation from the internet or via a scripted method. Finally, configure the Nessus system to suit user preferences. Here, therefore, the Nessus system is ready to identify offensive sites being hosted on JavaScript.
The attacks through the GIAC site are identified and detected when it starts to be abnormally slow. Sometimes the site may crash completely, rendering services unavailable. It may permanently crash. Besides, it is possible to continue using Baidu Analytics but users can ensure the script is not used for attacks by activating the system firewalls in the operating system. In addition, the Web tech should be informed to stop the attacks using the router given that they have access. Thus, the attacks can be monitored using preferred detection software or routing configurations to identify DDoS attacks.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00