Perform a formal risk assessment of a computer network

Assignment Help Computer Networking
Reference no: EM13944802

Task:

1. Perform a formal risk assessment of a computer network of your choice (A sample network architecture will be provided for your reference). You must seek my approval of the network architecture before proceeding. Locate references that assist in these assumptions and have a minimal architecture of dimensions equivalent to the provided sample;

2. You must model the expected network traffic between each and every pair of network devices i.e., links, in your network;

3. Download and install the R binaries from : R Binaries

4. Based on the network traffic model from Step 2 above, generate a dataset of network traffic values with the following TCP/IP header content: {Sequence ID, Source IP address, Destination IP address, Source Port number, Destination Port number, Protocol} - The dataset should have a minimum of 10K rows (data samples)

5. Run statistical analysis on the generated dataset using the R language. Common statistics collected on data include: Mean, Median and Variance of Occuring values for each header componet of the dataset.

6. Using R, plot Source IP address vs Protocol, Destination IP address vs. Protocol, Source Port number vs. Protocol, Destination Port number vs. Protocol.

7. Writeup an analysis of the data based on the results obtained above.

8. Recommend improvements to the architecture to help mitigate the effects of a network traffic-intensive attack.

Reference no: EM13944802

Questions Cloud

Pressure in the bottom of a swimming pool : What is the absolute pressure in the bottom of a swimming pool 24.2 m by 9.80 mm whose uniform depth is 2.12m ?
Prepare the stockholder equity section of dry dock balance : Prepare the 20X5 statement of stockholders' equity reflecting the above described transactions. Prepare the stockholders' equity section of Dry Dock's balance sheet at December 31, 20X5
Determine the probability that a butterfly is infected : Determine the probability that a butterfly is infected, given that it was tagged in both places. Enter an answer between 0 and 1, rounded to 2 decimal places, e.g. 0.31.
Pattern of children and young peoples development : describe the expected pattern of children and young peoples development from birth to 19years to include physical development communication and intellectual developmnet social emotional and behavioural development
Perform a formal risk assessment of a computer network : Perform a formal risk assessment of a computer network of your choice (A sample network architecture will be provided for your reference).
Design an advertisement poster : Students is expected to design an advertisement poster about "google eye glass". Advertising this product and service or experience and a power point slides discussing the poster .
Is a person more than a physical body : Is a person more than a physical body? What is the mind? What is thought?
What are the pros and cons of using expatriates : What are the pros and cons of using expatriates, host-country nationals, and third-country nations to run overseas operations? If you were expanding your business, what approach would you use?
Metal object becomes positively charged : You're looking over your buddy's class notes and notice the following things that are written down. For each item, state whether you agree or disagree with your friend, and explain briefly why.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the network management software components

Describe the network management software components

  A client sends 1024 bytes of data to a server using tcp

a client sends 1024 bytes of data to a server using tcp protocol. calculate the efficiency of this transmission at the

  How do delay jitter and packet loss affect voip calls

What is the difference between the SIP and RTP protocols used with VoIP? How do delay, jitter, and packet loss affect VoIP calls

  What protocol can use to move data

Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?

  What is the signal-to-noise ratio

As a signal propagates down a UTP cord, the noise level is constant. Will greater propagation distance result in fewer noise errors, the same number of noise errors, or more noise errors? Explain.

  Explaining client-server environment

You are administrator of a client-server environment. What type of network would you install and how would pieces and components of this network relate to each other?

  Important concerns for safety and security of the network

most important concerns for safety and security of the network

  Assignment on client-server program

Add code to the class: MyClient of lecture 1 to impose a timeout of 5 seconds. If a timeout does occur, a message "timed out on receiver" should be displayed and the client should be terminated.

  Calculate voip traffic load in access trunks to the internet

Calculate VoIP traffic load in access trunks to the Internet and Calculate the access bandwidth required and the number of SIP trunks needed for VoIP calls to the Internet

  Need a research paper on what is the single most important

need a research paper on what is the single most important new technology that has affected digital forensics in the

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Assignment on mister network engineer

Use IP addresses to describe your configuration. Explain the impact that each of your configurations has on the security of the entire network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd