Background of the Study:
Cybersecurity threats continue to evolve, posing significant risks to institutions, particularly universities that rely on digital infrastructures for learning, research, and administration. One of the most pervasive and damaging threats is the Distributed Denial-of-Service (DDoS) attack, which involves overwhelming a network or service with a massive volume of traffic, rendering it inaccessible to legitimate users (Girish et al., 2023). Universities, such as Federal University, Wukari, are attractive targets due to their open-access policies, large student populations, and interconnected digital services. A successful DDoS attack on the university’s network can lead to downtime in academic portals, email services, research databases, and administrative systems, disrupting critical operations (Singh & Verma, 2024).
DDoS attacks exploit vulnerabilities in network infrastructure, leveraging botnets and compromised IoT devices to amplify attack traffic. Traditional security mechanisms, such as firewalls and intrusion detection systems, are often ineffective in mitigating large-scale DDoS attacks due to their reactive nature (Kumar et al., 2024). Analyzing DDoS attack patterns specific to Federal University, Wukari, will provide insights into the attack vectors used, traffic anomalies, and mitigation strategies. A deeper understanding of these patterns will enable the development of proactive defense mechanisms to strengthen the university’s cybersecurity posture.
Statement of the Problem:
The increasing frequency and sophistication of DDoS attacks pose a significant threat to the digital infrastructure of Federal University, Wukari. Existing security measures are often insufficient in detecting and mitigating these attacks in real-time, leading to service disruptions and potential data breaches. Furthermore, there is a lack of comprehensive research on DDoS attack trends within the university’s network environment. Without a clear understanding of attack patterns and their impact, the institution remains vulnerable to prolonged service outages and financial losses. This study seeks to analyze the attack patterns targeting the university’s network and recommend strategies to enhance its resilience against DDoS threats.
Objectives of the Study:
To identify the common DDoS attack patterns affecting the network infrastructure of Federal University, Wukari.
To analyze the impact of DDoS attacks on the availability and performance of university digital services.
To propose and evaluate effective mitigation strategies for preventing and minimizing the effects of DDoS attacks on the university’s network.
Research Questions:
What are the predominant DDoS attack patterns targeting Federal University, Wukari’s network?
How do DDoS attacks impact the availability and performance of critical university services?
What are the most effective strategies for mitigating and preventing DDoS attacks in the university’s network environment?
Significance of the Study:
This study is significant in enhancing the cybersecurity readiness of Federal University, Wukari, by providing data-driven insights into DDoS attack trends. The findings will help network administrators develop proactive defense mechanisms, ensuring uninterrupted access to digital services. Additionally, the research contributes to the broader cybersecurity domain by advancing knowledge on DDoS mitigation in academic institutions.
Scope and Limitations of the Study:
This study focuses on analyzing DDoS attack patterns within the network infrastructure of Federal University, Wukari, Taraba State. The study is limited to network traffic analysis, attack detection, and mitigation strategies, excluding other cyber threats such as phishing and malware attacks.
Definitions of Terms:
DDoS (Distributed Denial-of-Service) Attack: A cyberattack in which multiple compromised systems flood a target network, causing service disruptions.
Botnet: A network of compromised devices controlled by an attacker to launch large-scale cyberattacks.
Traffic Anomalies: Unusual spikes or patterns in network traffic that indicate potential cyber threats.
ABSTRACT
This study was carried out on the role of nurses in management of thyphoid in west Africa; Onikokoro Community,...
Background of the Study
Corporate Social Responsibility (CSR) investments have increasingly been recognized as vital for...
Background of the Study
Understanding the interplay between GDP, consumption, and saving is essential for framing sound ec...
Background of the Study
Tuberculosis (TB) remains a significant public health challenge in Nigeria, with pediatric cases contributing sub...
ABSTRACT
The researcher chose to research on this topic “Computer Based Census Management System” because of its relevance to...
Abstract: This study aimed to explore the role of information systems in healthcare management within organizations. The objectives were to investi...
Background of the Study
Civic engagement, defined as the active participation of citizens in community and political affai...
Chapter One: Introduction
Background of the Study
Combined fiscal stimulus packages, which integrate increased government spending with targeted tax...
Abstract
Most accounting firms in their pursuit for higher financial rewards, promotions and status, practices such as c...