Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Using Wireshark for Network Traffic Analysis and Signature-Based Malware Detection

Part 1: Using Wireshark for Network Traffic Analysis

Part 1: Using Wireshark for network traffic analysis Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.  You will use Wireshark to analyse network traffic for attacks. Depending on the OS of your machine, download and install Wireshark from this link.  Question 1 (a) Cheryl the system administrator has discovered malicious reverse shell connection activities while performing a routine check on her company web server’s log. She has managed to retrieve a wireshark capture of the malicious network activities for further investigation. Apply the use of wireshark and analyze the given network trafficQ1a.pcap and answer all the questions below.Q1a.pcap (i) What is the web server’s IP address?(ii) What is the attacker’s IP address?July Semester 2020 (iii) What are the transport layer protocol and port number used for the reverse shell connection? (iv) What are the Operating System and the version running on the web server?(v) What is the name of the malicious script used to perform the reverse shell connection? (b) Salah the network administrator has discovered suspicious activities while performing a check on his company router’s network log. He has managed to retrieve a wireshark capture of the suspicious network activities for further investigation. Apply the use of wireshark and analyze the given captured network traffic Q1b.pcap and answer all the questions below. Q1b.pcap (i) What is the attacker’s IP address?  (ii) From the captured traffic [packet number 1-17], provide details on the type of attack, objective, technique and tool used by the attacker.Analyze and evaluate the packets from packet number 64 onwards. (iii) What is the objective of the attacker?  (iv) Provide a countermeasure and explain how the pros and cons of the countermeasure against the attack identified. – July Semester 2020 Part 2: Signature-based malware detection using regular expression Malware has threatened computers, networks, and infrastructures since the 1980s. There are two major technologies to defend against this, but most organizations rely almost exclusively on just one approach, the decade’s old signature-based methodology. The more advanced method of detecting malware via behaviour analysis is gaining rapid attraction but is still largely unfamiliar. Signature-based malware detection is used to identify "known" malware. In computing, all objects have attributes that can be used to create a unique signature. Algorithms can quickly and efficiently scan an object to determine its digital signature. When an anti-malware solution provider identifies an object as malicious, its signature is added to a database of known malware. These repositories may contain hundreds of millions of signatures that identify malicious objects. This method of identifying malicious objects has been the primary technique used by malware products and remains the base approach used by the latest firewalls, email and network gateways. Signature-based malware detection technology has several strengths, the main being simply that it is well known and understood – the very first anti-virus programs used this approach. It is also speedy, simple to run, and widely available. Above all else, it provides good protection from the many millions of older, but still active threats. You will use PCRE (Perl Compatible Regular Expressions) to write simple programs to detect malware based on given signature patterns. Refer to the document below for a summary of the PCRE syntax. You can also go to https://regex101.com/ for an online testing environment. SETUP Double click on the zip file below. . For example, if your PCRE is in the file demopattern.txt, and the malware signature to be tested is in demosignature.txt, you can type in the command pcre2grep.exe -o -f demopattern.txt demosignature.txt, followed by Enter key. The malware signature of "DODO" is detected and printed out on the screen. Question 2 TWO (2) different malwares have been released recently by hackers. For each of the malwares, apply a regular expression to detect the signature of the malware among the FIVE (5) given malware signatures. Provide the regular expression used for each of the malwares and screenshot of the detection process. Screenshots must be provided from the command prompt of your computer. (a) Malware C has a signature consisting of seven to nine leading lowercase alphabets excluding the alphabets b,f,h,j,r,y,z, followed by an optional number ranging from 2 to 7. After which, there are at least four, but not more than six uppercase alphabets. An exclamation mark optionally follows, after which the signature will end with an uppercase B, F, G or Z. Example of a malware C signature looks like " ctllola3GUMQG!G", " xpmmueo7JCPURDB" or " sxdgcvcxDTVSNZ" (b) Malware D has a signature consisting of at least two, but not more than seven leading numbers, followed by one or two hyphens. A lowercase alphabet excluding the vowels optionally follows, after which follows at least one but not more than three alternating pair of characters consisting of either upper or lowercase of alphabets "J" and "K". The malware signature may optionally end with a "#" or "@" symbol. Samples of malware signature include "59-jk", "3488488--jKJkJK#" and "507--dJK@".Due to the COVID-19 situation, the city of Corona is calling for a proposal for a Quarantine Monitoring System (QMS) in everyone's home to keep track of those who are under home quarantine. QMS needs to keep track of the person's health parameters such as temperature, heart rate, and whether the person has left the house without authorization. Once an abnormal situation occurs, QMS will send an alert to the police which is nearest to the location for investigation. QMS must be accessible by authorized users anytime and anywhere. Using concepts of smart computing which you have learnt in this module, propose a design which will satisfy all the given requirement. Assess the merits of your design, as well as critique any other potential issues such as security and privacy of data. (a) Demonstrate your design in a diagram showing all the required components/devices taking into considerations of the above requirements. (b) Explain how the various components of your design can work together seamlessly to provide the requirements needed by the Corona Government. (c) After the implementation of QMS, a policeman receives an alert on his mobile phone QMS app on a potential situation for further investigation shown in Figure Q3(c) below. Based on the given diagram showing what he is seeing immediately after receiving the alert, assess potential security issues with the QMS mobile app and critique on how security can be improved

support
close