How to recognize any attack signature in packets you analyze

Assignment Help Computer Engineering
Reference no: EM133571202

Assignment

You are hired by an organization to analyze packet captures from a wireless network. You are looking to assess if the captures pose a threat.

Analyze the packet captures provided by Wireshark by doing the following:

Visit the Gitlab SampleCaptures webpage to download the following:

1. wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic
2. wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample
3. nb6-hotspot.pcap Someone connecting to SFR's wireless community network
4. ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0
5. wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer's system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1 to 2 pages table that ranks the packet captures from the highest to lowest threat. In your table, provide the following for each packet capture:

1. Description of the traffic
2. Description of the risks, if any, the traffic poses to the wireless network
3. Countermeasures to take to secure the network from any threat

Write a 2 to 3 pages memo to management as a network security specialist, and ensure you do the following:

Question 1. Explain how to distinguish hostile packet data from normal packet data.
Question 2. Explain how to recognize any attack signatures in the packets you analyze.
Question 3. Provide a rationale for ranking the packets as you did.

Reference no: EM133571202

Questions Cloud

Discuss how the human factor affects cybersecurity : CSSS 5000- Discuss how the human factor affects Cybersecurity. What is Social Engineering? What are some techniques to implement Social Engineering?
What are the elements of snoubar prima facie case : What are the elements of Snoubar's prima facie case? Do you think that playing radio broadcasts of offensive characterizations alone would be sufficient
What is the industry that you see this opportunity exists in : What is the industry that you see this opportunity exists in? Please describe the industry in detail such as the current state, major players
What you believe to be the goal of the intervention phase : Describe what you believe to be the goal of the intervention phase and the role of a social worker in this phase
How to recognize any attack signature in packets you analyze : Explain how to distinguish hostile packet data from normal packet data. Explain how to recognize any attack signatures in the packets you analyze.
Do you agree with your peer argument to either invest : Do you agree with your peer's argument to either invest or not invest in their company? Explain why or why not. Make sure to include information not previously
Sociological social vs. psychological social psychology : What is the difference between sociological social psychology vs. psychological social psychology.
How the action would impact the financial statements : Provide reasonable and specific projections of how this action would impact the financial statements or figures you selected in the first bullet point.
Specific activities in the areas of collaboration : Specific activities in the areas of collaboration, consultation, and program planning, to meet the 120 indirect hours.

Reviews

Write a Review

Computer Engineering Questions & Answers

  In this project you will prepare a program by using an

in this project you will create a program using an array which keeps a list of the rent rates for an apartment

  Write a program to implement the simulation of bouncing ball

Write a program to implement the simulation of a bouncing ball. Write a program to implement the motion of a bouncing ball using a downward gravitational force.

  Implement priority queue as linked list based data structure

In this assignment you will implement a priority queue as linked list based data structure. Your reading book offers a good guide for design and implementation.

  Describe the design goals and considerations

Describe the design goals and considerations. Design a drawing appropriate for implementation. The high-level system design should be further decomposed into.

  Create a simple swift application in xcode

Create a simple (Swift) application in Xcode that gathers the following personal information. Collect the date of birth using a modal view with a date picker.

  What role does open access software play

What role does open access software play in the evolution of technology? How has the growth in Linux popularity facilitated the growth of proprietary tools?

  What would be the impact of predictive modeling

What would be the impact of predictive modeling on healthcare and medicine? Can predictive modeling replace managerial or medical personnel?

  Explain the common user interface

Think about how the Microsoft Office applications have been designed to work together. Look at the user interfaces of all the Microsoft Office applications you have installed on your computer and define the common user interface and features you s..

  How many times the program has been executed

Write a Java program to track how many times the program has been executed. You can store an int representing the count in a file.

  How customers learned about pur

MIS 310 Iowa State University track how customers learned about PUR, and identify repeat customers, so that PUR can mail special offers to them

  Write down problem on strings in java

Write down problem on strings in java

  How models and their solutions are used by the us

Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the war against terrorism.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd