Chooses one attacks (from different layers) below and does independent study on the chosen topics. • Prepare detailed presentation (15 min) with power point slides • Describe the attack and the prevention

• Chooses one attacks (from different layers) below and does independent study on the chosen topics.

• Prepare detailed presentation (15 min) with power point slides

• Describe the attack and the prevention (or detection or mitigation) methods

• Please create original diagrams with Visio, http://draw.io, etc..

• All diagrams should be explained.

• This project is technical presentation which should be created in PowerPoint. Select a type of attack outlined in project description.

• Select an attack topic and build a presentation which will contain the following:

• How is the attack launched is it perpetrated by tools, social engineering, scripts, etc.. ?

• What type of target this attacks pinpoints switches, routers, etc..?

• What measures can be taken by an organization to stop the attacks such tools, device, etc.. ?

• Please provide background and statistics regarding the attack.

• Please site all resource utilized in APA format

https://apastyle.apa.org/ (utilize PDF for explanation)

1.     The port scanning or port enumeration techniques attacks

• SCTP Cookie Echo Scan

• Spear-phishing

• Banner grabbing

• Web-based Directory Enumeration Attack

• FTP bounce scanning

• ARP (Address Resolution Protocol) scan

• Vanilla attack

• SNMP Enumeration

2. Layer 2 attacks or lower layer attacks

• VLAN hopping,

• MAC address spoofing, MAC flooding

• Spanning-Tree Attack

• Jamming Attack

• Vulnerability on Neighbor Discovery Protocol (NDP)

• GARP Attacks/ARP poisoning

• Private VLAN Proxy Attack

• MAC flooding, MAC spoofing and ARP flood attacks

• Authentication/Association flood attack and deauthentication/disassociation

flood attack                                                                                                          —-

3.     Layer 3 (or Router) attacks

• DNS Rebinding and Route Table Poisoning

• Cross-Site Request Forgery (CSRF)

• Max Sequence Number Attack via OSPF

• BGP Router Attacks

• RIP Attack

• Heap and Stack Overflow Attacks

• DHCP Starvation/ DHCP Consumption Attack/DHCP Exhaustion Attack

• Peer-to-Peer and Smurf attacks

• Routing Table Modification and Denial of Service Attacks

• Denial of Service Attacks- SYN Floods

• OSPF and XSS attacks