New

Learn smart - Learn online. Upto 80% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

7 Pages
CST 610 Cyberspace and Cybersecurity Foundations

Your work will be evaluated using the competencies listed below.Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.Evaluate ...

Course

CST 610

Type

Programming

Subject

Networking

University

University of Maryland

131 Pages
ITC542 Internetworking with TCP/IP

In this assessment, you are required to read Research Network Design and research a range of options/methods that can be used for network designing. Based on your research you are required to post y ...

Course

itc542

Type

Programming

Subject

Networking

University

Charles Sturt University

12 Pages
EEET2424 Computer and Network Security

You need to pick one of the two topics listed below: Review of Intrusion Detection (ID) in ??? (a Specified Network Scenario) You are required to conduct an intensive literature review on ne ...

Course

EEET2424

Type

Assignment

Subject

Networking

University

Melbourne Institute of Technology

11 Pages
B9IS103 Computer Systems Security

Questions: Question 1: (50 marks)You are a network administrator for a local IT company. After arriving into work on a Monday morning your manager calls you into his office and tells you there has ...

Course

B9IS103

Type

Home Work

Subject

Networking

University

Dublin Business School

CSCI 6706 Computer & Networks Security

Question

Answered

Objective:
To conduct a representative sequence of activities for security management.
Questions:
Your task is to solve the following problems:
1. In this task, I would like you to perform intrusion detection using SNORT that is introduced as in Hands-on Lab 6. For this purpose, you can use pcap and/or tcpdump files from the followingpublic repositories (or others): • DARPA Intrusion Detection Datasets: https://archive.ll.mit.edu/ideval/data/index.html
• NETRESEC Pcap Datasets
• UNB Datasets:
• Dalhousie NIMS Lab Datasets:
• Or others.
For this task, you can use the following as needed: • Snort: https://www.snort.org
• Tcprewrite:
To demonstrate that you perform the task, you must give screen shots, results of detection in terms of IDS performance metrics as the well as the statistics (count, mean, min, max)regarding the Snort rules used and their discussion.
As an example, please read:
• Ansam Khraisat, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman ; “Survey ofintrusion detection systems: techniques, datasets and challenges”, Cybersecurity, 2019:https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-019-0038-7 (check pages 11 and 12 for the performance metrics)
2. In this task, you are expected to investigate / read about the pcap (or tcpdump) data set that you choose for the first task and understand the attacks that were captured. Then, you can design /find / improve the rule to detect that type of attack. You can get some ideas from:• Gunes Kayacik, Nur Zincir-Heywood; “Evaluation of the Cisco IOS Firewall with Darpa 99 Dataset”

CSCI 6706 Computer & Networks Security

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

6 More Pages to Come in This Document. Get access to the complete answer.

Looking for corporate assignment help? Then MyAssignmenthelp.com is your one-stop answer. We render custom-made assistance with corporate as well as with IT assignment. We are available 24*7 to offer operating system, database, MATLAB, web development and lots of other IT subject based assignment help. We work round the clock to ensure 100% students satisfaction with our delivered service and to make sure that students get assistance on urgent basis.

More CSCI6706 CSCI 6706 Computer & Networks Security : Questions & Answers

Q
icon

We aren't endorsed by this University

CST 610 Cyberspace and Cybersecurity Foundations

Your work will be evaluated using the competencies listed below.Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.Evaluate the information in a logical and organized manner to determine its value and relevance to the proble ...

View Answer
Q
icon

We aren't endorsed by this University

ITC542 Internetworking with TCP/IP

In this assessment, you are required to read Research Network Design and research a range of options/methods that can be used for network designing. Based on your research you are required to post your views on pros and cons of each available option for the completion and select an option that you ...

View Answer
Q
icon

We aren't endorsed by this University

EEET2424 Computer and Network Security

You need to pick one of the two topics listed below: Review of Intrusion Detection (ID) in ??? (a Specified Network Scenario) You are required to conduct an intensive literature review on network intrusion detection research and development for a special application scenario, for example, ...

View Answer
Q
icon

We aren't endorsed by this University

B9IS103 Computer Systems Security

Questions: Question 1: (50 marks)You are a network administrator for a local IT company. After arriving into work on a Monday morning your manager calls you into his office and tells you there has been an attack on the company's network. Logs from the external facing router/firewall appear to sh ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?