Assignment Document

Network Architecture and security

Pages:

Preview:


  • " NETWORK SECURITY Table of Contents1. Network Architecture ......................................................................................................... 22. Network setup ....................................................................

Preview Container:


  • " NETWORK SECURITY Table of Contents1. Network Architecture ......................................................................................................... 22. Network setup ..................................................................................................................... 33. Network Attack modelling ................................................................................................. 34. PCAP FILE ....................................................................................................................... 235. Download and Installation of R Binaries ......................................................................... 245.1 Mean .......................................................................................................................... 275.2 Median ....................................................................................................................... 275.3 Variance .................................................................................................................... 285.4 Graph for Source IP address Vs Protocol.................................................................. 285.5 Graph for Destination IP address Vs Protocol .......................................................... 296. Steps to reduce network traffic ......................................................................................... 307. References ........................................................................................................................ 311 1. Network ArchitectureVisio file is attached here.The above network architecture diagram is created using the network peripherals,such as WAN, router, firewall, switch, personal computer and web server. Router isconnected with the WAN. Router is used to connect multiple networks, which transfers thepackets to the desired location.Firewall is connected with the router, which is mainly used forthe security purposes. Switch is connected with the firewall, which is used to connectmultiple network devices, such as personal computer, laptop, etc.Switches perform theoperation in the same network(Serpanos, Baldi, & Giladi, 2007).Risk AssessmentRisk assessment is used to control the crucial issues in the networks. In this project,the main risk is the performance failure of switch. If the switch fails, then the wholeconnection of the network also fails. So, the maintenance of the switch is more important, asit is the main risk. Functionality of the network systems, current security and continuity aredetermined by the risk assessment. In risk assessment, always conduct the performanceanalysis of firewall, switches, routers, routers, software and hardware. Computer networks2 threats are controlled by the risk assessment. In computer networks integrity, availability andconfidentiality are allowed by the risk assessment.2. Network setupNetwork design is created using Microsoft Visio 2013. Kali Linux is used as a back track,which is used to create the attack scenario. Packets are captured by usingWireshark(McGrath, 2006).3. Network Attack modellingCreation of UserCreate the username using this command $ sudoaddusermanav. Here, the user name ismanav(Qin, 2014).The new user is added in the sudo group. $ sudovisudo3 Enter the following command to change the PrivilegesmanavALL=(ALL:ALL) ALLUnder rootALL=(ALL:ALL) ALL4 Now, click CTRL+X.It saves the changes and exits the window.Enter this command to rename the hostname and change the name. $sudo gedit/etc/hostname.5 Click save button after renaming.Enter the following command to rename the host:$ sudogedit /etc/hosts.6 Click save button to save the changes.Enter the following command to initialize the host name:$ sudo /etc/init.d/hostname.shstart7 Use the following command to update the host: $ sudo apt-get update8 APACHE 2 installationApache2 server is installed using the following command(Haddad et al., 2008).$ sudo apt-get install apache2Apache2 server is installed.9 Using the nano editor window change the default webpage name. $ sudonano /var/www/html/index.html.10 The below page shows the edited webpage name.11 ACTIVATE SSL $ sudo a2enmod ssl. Thiscommand is used to activate the SSL.A new directory is created using the following command.$ sudomkdir /etc/apache2/sslmanavProvide the key,for SSL using the following command.$ sudoopensslreq –x509 –newkey rsa:2048 –keyout /etc/apache2/sslmanav.apche.key – out/ etc/apache2/sslmanav/apache.crt12 The default ssl configuration file is viewed and it exits the window.To update the configuration details, restart the Apache window.13 Before enabling the SSL Enter the IP address https://192.168.0.110in the browser. After enabling the SSLClick the advanced button to view the certificate.14 Click the error code to view the issues of thecertificate.SEC_ERROR_UNKNOWN_ISSUER 15 Click the advanced button, to add the security exceptions.16 Click the confirmation security exception button.The below page is the default page of manav apache2.17 INSTALL THE WIRESHARKInstall the wiresharkusing the following command(Orebaugh, Ramirez, & Burke, 2007).$ sudo apt-get install –y wiresharkWireshark is used to convert the pcap file into csv file.18 Wireshark is installed successfully.Add the wireshark group using the following command:$ sudoaddgroupwiresharkEnter the following command to provide the privileges for Dump:$ sudochownroot:wireshark /usr/bin/dumpcap$ sudosetcapcap_net_raw,cap_net_admin=eip /usr/bin/dumpcap$ sudousermod -a -G wiresharkmanav19 Traffic Analysis using Wire sharkThe network traffic is analysed using wire shark.Wire shark analyses the network in amicro level. Network card is used to analyse the network card.Wire shark is used in windows,Linux, Mac.It is a powerful network analyser.The data that passes through the network isanalysed by wireshark.The series of data in the frames are inspected by the wireshark.Thetext file is imported to the wire shark.When troubleshooting the WLAN, the network packetsare analysed by the wireshark.Wireshark has many tools to diagnose the problems. It usesWin cap or Lip cap to analyze the traffic in the network. Wireshark don’t support wirelesscards.So, it is not possible to monitor the traffic in the windows operating system.The numberof packets capturing is limited by the Win cap.In promiscuous mode, the Wi-Fi traffic iscaptured.Wireshark doesn’t have GUI.It is available in the software distribution system.Thetraffic is identified by the colours.Blue colour is used to monitor the UDP SNMP traffic.Darkblue colour is used to monitor the DNS traffic. Green colour indicates the traffic in HTTP.20 INSTALL TCPDUMPEnterthe following command to install the tcpdump(Tcpdump, 2012).$ sudo apt-get install tcpdumpTcpdump is installed.Enter this command to verify the tcpdump server.$ sudotcpdump –DEnter the following command to check the connection for packet capturing.$sudotcpdump–i enp3s021 Create a pcap file data2.pcap by using the same commands in the above screen shot. $ sudotcpdump -w data2.pcap -i enp3sEnter the following command to read the pcap file.$ sudo tcpdump -r data2.pcap22 4. PCAP FILEPcap file is attached below.26571 packets are captured. The below screenshot shows the received packets.23 5. Download and Installation of R BinariesOpen the downloaded R Binaries file from the desired folder(Gentleman, 2009). Rprogramming is used to read the csv file and also calculate mean, variance and median.It is also used to plot the graphs.24 Set language to the R programming setup.Click the next button, in the setup window..Select the prefered location to install the R programming.25 Select the required components to the setup.R programming installation process will be started.After the installation process, icon will appearon the desktop.26 5.1 MeanMean of time, source, destination, protocol and length is determined (Matloff, 2011).5.2 MedianMedian of time, source, destination, protocol and length is determined.27 5.3 VarianceVariance of time, source, destination, protocol and length is determined.5.4 Graph for Source IP address Vs ProtocolBy using the below command,the graph is plotted between Source IP address Vs Protocol.28 5.5 Graph for Destination IP address Vs ProtocolBy using the below command,the graph is plotted between Destination IP address VsProtocol.296. Steps to reduce network traffic? Network redundancy is used to control the network traffic.? Network traffic should be monitored to reduce the network traffic.? Network segmentation should be performed to reduce the network traffic.? Give backpressure routing.30 7. ReferencesGentleman, R. (2009). R programming for bioinformatics. Boca Raton: CRC Press.Haddad, Z., Falissard, B., Chokri, K., Kamel, B., Nader, B., Nagi, S., &Riadh, S. (2008).Disparity in outcome prediction between APACHE II, APACHE III and APACHEIV. Critical Care, 12(Suppl 2), P501. http://dx.doi.org/10.1186/cc6722Matloff, N. (2011). The art of R programming. San Francisco: No Starch Press.McGrath, M. (2006). Linux. Southam, Warwickshire, UK: In easy steps/Computer Step.Orebaugh, A., Ramirez, G., & Burke, J. (2007). Wireshark& Ethereal network protocolanalyzer toolkit. Rockland, MA: Syngress.Qin, Y. (2014). Computer Network Attack Modeling and Network Attack GraphStudy. AMR, 1079-1080, 816-819.http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816Serpanos, D., Baldi, M., &Giladi, R. (2007). Network Systems Architecture [GuestEditorial]. IEEE Network, 21(4), 6-7. http://dx.doi.org/10.1109/mnet.2007.386462Tcpdump. (2012). [Place of publication not identified].31 "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top