whatsapp

Connect on Whatsapp : +97143393999, Uninterrupted Access, 24x7 Availability, 100% Confidential. Connect Now

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

18 Pages
IY1D403 Secure Server Configuration and Networks

Task Learning Outcomes 1) To demonstrate a practical and theoretical understanding of the practices and principles associated with the installation and secure configuration of servers and network ...

Course

IY1D403

Type

Programming

Subject

Networking

University

University of South wales

Season

Autumn

7 Pages
COMP2001 Network Troubleshooting, Monitoring and Planning

Task:  Task Description  In this assignment, you will complete two tasks.• Task 1: Network troubleshooting. In this task, you will continue to manage the Cisco Academy lab network a ...

Course

COMP2001

Type

Programming

Subject

Networking

University

Southern Cross University

7 Pages
Management

Well this whole topic is a bit too much PHY-oriented for our course, but I think the following could be interesting for CN1/CN2 context: Normally, when you send packets between NBIoT sensor and the ne ...

Type

Programming

Subject

Networking

47 Pages
Supermarket Vehicle Rental Tourism Agency

Unit Name/Code ISY3006 Information Security Assessment Type Group Report Assessment Number Assessment four Assessment Name Report Unit Learning LO3 - Research, develop, and do ...

Course

ISY3006

Subject

Networking

University

Australian Institute of Higher Education

Season

Spring

IFN507 Network Systems

Question

Answered

Question:

Need to analyze a capture file of a website that has some error and need to provide a report for the same.

Task 1: Security Analysis and Mitigation

You are a network administrator working for XYZ company. Your manager has received reports that the company’s website is not working. Users attempting to access the website report that they receive a ‘page cannot be displayed’ error in their browser. Your manager asks you to investigate the situation, analyse the potential cause or causes of the website service disruption, suggest solutions, and outline their limitations. You must detail your findings in a report.

You confirm the interrupted service issue by visiting the website from your browser. The error message is displayed. Following this, you decide to perform some basic troubleshooting. You attempt to visit the website using the IP address 192.168.170.8 directly with no success. Based on this preliminary investigation, you suspect there may be a problem with the Web Server. You determine that the server has been subject to some form of attack. You must investigate further, so that you understand what happened and can suggest appropriate solutions. Please be aware this is just a scenario. The IP address 192.168.170.8 is not a real website address.

What To Do For This Task?

1) Extract a sample of the network traffic from the Web Server

Download the capture file “Capture_Project_A_B.pcapng”. It is in the same folder as this assessment task specification. Note that the capture file provided is only a very small sample of the total traffic captured from the server. For this assessment task, you can assume the rest of the capture shows the same trends, with patterns that are similar and consistent with those in the provided scenario capture file. The sample you have been provided is small but representative.

2) Data examination and analysis

  1. What would you expect to see in a Web server capture under normal operation? Provide a detailed and technical explanation of the TCP protocol.
  2. Examine the data in the scenario capture file. Analyse the data, compare this with normal expected behaviour and determine what has taken place. Record your observations and make connections between the specific data items included in the file and your description of the events that likely occurred.
  3. Consider the security goals for the organisation that may have been compromised, the vulnerabilities that have contributed to the incident and the threats that acted on them.
  4. What type of attack has occurred (active or passive)? Justify your claim. That is, refer to the data in the file to provide supporting evidence. What are the possible technical and organisational consequences of this incident for XYZ company?
  • Potential mitigation strategies

Perform some independent research to identify mitigation strategies that could be applied in this scenario. Provide at least one strategy from each classification (preventative, detective and corrective), and discuss the strengths and limitations associated with it. If you decide that a certain class of strategy is not applicable, explain why.

4) Documentation

Your team must complete an investigation and write up a report for the XYZ company manager. Details to assist in constructing your report are provided in the report section.

Task 2: Network Performance Evaluation

A pure-text ns-3 trace file “Assignment.tr” is provided, which results from an ns-3 simulation study of a network of four nodes n0, n1, n2, n3. Your tutor will explain the format of the ns-3 trace file in your practical’s session. The internal representation of the network and network nodes is shown below in Figure 1. Nodes n0 is source nodes. n2 and n3 are sink nodes. n1 is a router.

The traffics are as follows:

n0 => n2 TCP segments (payload size = 50 bytes)

n0 => n3 TCP segments (payload size = 50 bytes)

The IP addresses for the five nodes in the network are configured as follows:

n0: 192.168.1.1

n1: 192.168.1.2 and 192.168.2.1 and 192.168.3.1 Figure 1: Network Model

n2: 192.168.2.2

n3: 192.168.3.2

What To Do For This Task?

Choose source node n0 and sink node n3. Calculate the following:

  • End-to-End Delay over time;
  • Minimum End-to-End Delay;
  • Average End-to-End Delay;
  • Maximum End-to-End Delay;

For computational efficiency, you are asked to use Linux utility “ grep” or “awk” or both for your calculation. You are required to write the steps of your commands and calculation. You should present the performance over the time using a plot.

Task 3: Reflections

Your report should include a separate section of reflections. In this section, each student is asked to write a paragraph in your report to reflect on what you have achieved so far from this unit, and specifically from this assignment. This gives you an opportunity to reflect on what you have learned and also what you think you need to improve. Your reflections are expected to be specific to yourself (not general to others).

Task 4: Declaration of Contributions

This assignment is a group-of-four project. Your report should include declaration of contributions inside cover page . In the declaration, each of your group members is required to declare individual contributions to the project.

IFN507 Network Systems

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

26 More Pages to Come in This Document. Get access to the complete answer.

MyAssignmenthelp.com is acknowledged for providing best assignment help at affordable price. With our urgent assignment help, students never miss their deadlines. Our highly skilled and qualified experts are capable of crafting premium quality online assignment help solutions within shortest deadlines. Hence, MyAssignmenthelp.com has emerged as the one-stop solution for all those who need assignment help within short period of time.

More IFN507 IFN507 Network Systems: Questions & Answers

Q
icon

We aren't endorsed by this University

IY1D403 Secure Server Configuration and Networks

Task Learning Outcomes 1) To demonstrate a practical and theoretical understanding of the practices and principles associated with the installation and secure configuration of servers and networks. 2) Demonstrate practical and theoretical knowledge of key principles of prevailing server system ...

View Answer
Q
icon

We aren't endorsed by this University

COMP2001 Network Troubleshooting, Monitoring and Planning

Task:  Task Description  In this assignment, you will complete two tasks.• Task 1: Network troubleshooting. In this task, you will continue to manage the Cisco Academy lab network at Southern Cross University. You were reported that students using the lab had experienced some issu ...

View Answer
Q

Management

Well this whole topic is a bit too much PHY-oriented for our course, but I think the following could be interesting for CN1/CN2 context: Normally, when you send packets between NBIoT sensor and the network (uplink or downlink, no difference), you have some overheads associated with actually wrapping ...

View Answer
Q
icon

We aren't endorsed by this University

Supermarket Vehicle Rental Tourism Agency

Unit Name/Code ISY3006 Information Security Assessment Type Group Report Assessment Number Assessment four Assessment Name Report Unit Learning LO3 - Research, develop, and document a basic security policy, Outcomes Assessed and analyse, record, and resolve all securit ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?