Perform an interception attack

Assignment Help Other Subject
Reference no: EM133505694 , Length: word count:1500

Advanced Network Security

Question 1. Packet Capture and Analysis

For this question you must use virtnet (as used in the tutorials) to perform an interception attack. This assumes you have already setup and are familiar with virtnet. See Moodle and tutorial instructions for information on setting up and using virtnet. The tasks and sub- questions are grouped into multiple phases. You must complete all phases, in order.

Phase 1: Setup
1. Create topology 5 in virtnet. node1 will be referred to as the client, node2 the router, and node3 the server.
2. The attacker has access to the router and will run tcpdump to capture packets.
3. Users on the client and server will use applications to communicate. For this task,
netcat will be used to generate the application traffic.
4. Server port numbers must be assigned based on the last three (3) digits of your student ID, xyz, as defined below. Examples are given for a student ID of 12345678.
• For netcat TCP server use port 8xyz. Example port: 8678

Phase 2: Intercept TCP Application Traffic
The attacker should capture traffic on the router (node1) for the following TCP application traffic.
1. Start the netcat TCP server using the assigned port on the server (node3)
2. Start the netcat TCP client on the client (node1)
3. On the client, type the following (use your actual first name):
COIT20262 TCP<press ENTER>
My ID is [studentID] <press ENTER>
My first name is [FirstName]<press ENTER>
<Ctrl-D>
The attacker should then stop the capture, and save the file as:[StudentID]-tcp.pcap

Phase 3: Analysis
Answer the following sub-questions regarding the previous phases.
(a) Submit[StudentID]-tcp.pcap file on moodle. (0.5 marks)
(b) Draw a message sequence diagram that illustrates all the TCP packets generated by using netcat in phase 3. Do not draw any packets generated by other applications or protocols, such as ARP, DNS or SSH, and do not draw the UDP packets. Only draw TCP packets. A message sequence diagram uses vertical lines to represent events that happen at a computer over time (time is increasing as the line goes down). Addresses of the computers/software are given at the top of the vertical lines. Horizontal or sloped arrows are used to show messages (packets) being sent between computers. Each arrow should be labelled with the protocol, packet type and important information of the message. Examples of message sequence diagrams are given in tutorials. Note that you do not need to show the packet times, and the diagram does not have to be to scale. You

must draw your own diagram; you cannot use the diagram generated by Wireshark. (2.5 marks)

(c) If the attacker performs a modification attack on the TCP exchange, changing the unit code from COIT20262 to COIT20264, then will the server (node3) know that an attack may have occurred? Explain why or why not. Also explain a technique that could be used so that the server (node3) is certain the message was not modified.

(d) If the attacker performs a replay attack on the TCP exchange, replaying the messages without any modification, then will the server (node3) know that an attack may have occurred? Explain why or why not.

Question 2. Attack Detection from Real Intrusion Dataset

For this question you need to implement three multi-classifiers to identify attack and normal behaviour from the UNSW-NB15 intrusion dataset. You are required to read the data from training set (175,341 records) and test set (82,332 records).
You are required to implement it by using the publicly available machine learning software WEKA.
For this task you will need two files available on Moodle:

• training.arff and test.arff.
You need to perform the following steps:

• Import training data.
• For each classifier:
- Select an appropriate classifier (do not choose any meta classifier)
- Specify test option
- Perform the training
- Supply test data set
- Evaluate the classifier.
You need to repeat for at least 3 classifiers, and eventually select the results from the best 2 classifiers.
You need to include in your report the following:

(a) Screenshot of the performance details for 3 classifiers

(b) Compare the results of the selected best 2 classifiers, evaluating with the metrics: Accuracy, precision, recall, F1-Score and false positive rate.

Reflection:
(c) Which classifier gave the best performance overall? Justify your selection of the ‘best' classifier and given reasons why you think it is the best. Is there any way to improve the performance further?

Question 3. Encryption and Signing

Aim
Your aim is to demonstrate skills and knowledge in cryptographic operations, especially key management. You will do this in pairs (that is, with a partner student).

When performing cryptographic operations you must be very careful, as a small mistake (such as a typo) may mean the result is an insecure system. Read the instructions carefully, understand the examples, and where possible, test your approach (e.g. if you encrypt a file, test it by decrypting it and comparing the original to the decrypted). It is recommended you use virtnet to perform the operations.

Phase 1: Key Generation
1. Generate your own RSA 2048-bit public/private key pair and upload your public key to the Public Key Directory on Moodle. (If you have already done this in the tutorial, you do not need to do it again). Save your keypair as [StudentID]-keypair.pem.
2. Generate a secret key to be used with AES-256-CBC, saving it in the file [StudentID]- key.txt.
3. Generate an IV to be used with AES-256-CBC, saving it in the file [StudentID]- iv.txt.

Phase 2: Message Creation and Signing
1. Create a message file [StudentID]-message.txt that is a plain text file containing your full name and student ID inside.
2. Digitally sign [StudentID]-message.txt using RSA and SHA256, saving the signature in the file [StudentID]-message.sgn.
Phase 3: Encryption
1. Encrypt [StudentID]-message.txt using symmetric key encryption, saving the ciphertext in the file [StudentID]-message.enc.
2. Encrypt [StudentID]-key.txt using public key encryption (RSA), saving the ciphertext in the file [StudentID]-key.enc.
3. Encrypt [StudentID]-iv.txt using public key encryption (RSA), saving the ciphertext in the file [StudentID]-iv.enc.

Phase 4: Upload to your Partner
1. To send files to your partner, you must upload them to the Encrypted Files database onMoodle. Your partner can then download from the database.
Phase 5: Decryption and Verification
1. Download the files from your partner from the Encrypted Files database.
2. Decrypt to obtain the message, saving it in the file [StudentID]-received.txt.
3. Verify the signed message.

Phase 6: File Submission
a) Submit the files on Moodle. As output from these phases, you should have the followingfiles for submission on Moodle:
• [StudentID]-message.txt
• [StudentID]-keypair.pem
• [StudentID]-pubkey.pem
• [StudentID]-key.txt
• [StudentID]-iv.txt
• [StudentID]-message.sgn
• [StudentID]-message.enc
• [StudentID]-key.enc
• [StudentID]-iv.enc
• [StudentID]-received.txt (this will contain the message you received from your partner)
Even though the encrypted files and public keys must be available on the Moodle databases, you should also include a copy of the files in your assessment submission. Ensure the files in the database and your submission are the same - the marker may use either version.

Phase 7: Reflection
Think about the tasks you performed in this question and write a brief reflection. You should:
(a) Submit your files on Moodle as listed above. Also take a screenshot showing the OpenSSL verification command and the message contents. That is, the single screenshot should show the output of two commands:
openssl dgst ...
cat [StudentID]-received.txt

Include the screenshot on your assignment answer template.

b) Write a reflection on which parts were the most challenging or led to mistakes, and why there were mistakes?

c) Find and discuss the potential security vulnerability in the process/the steps you took.

Question 4. Ransomware Research

You need to perform the following tasks:

(a) Write an interesting, engaging, and informative summary of the provided article. You must use your own words and you should highlight aspects of the article you think are particularly interesting. It is important that you simplify it into common, easily understood language. Your summary MUST NOT exceed 300 words.

(b) Find an Internet (online) resource (e.g., research article or link) that provides additional information and/or a different perspective on the central theme of the article you summarised in (a). Like you did in (a), summarise the resource, in your own words and the summary should focus on highlighting how the resource you selected expands upon and adds to the original prescribed resource. You must also provide a full Harvard reference to the resource. This includes a URL and access date.

(c) Reflect on the concepts and topics discussed in the prescribed article and the resource you found and summarised and how you think they could potentially impact us in future.

Maintaining Journal

Whenever you perform tasks, you should be recording important information in your online journal. This may include notes, commands you have run, parts of files you edited, and screenshots. You will be marked on how well you have maintained your journal (including technical depth) and how accurately it captures your tutorial and assignment practical activities from Week 1 to Week 5. Your online journal may be also referred to when marking your submission. For example, if the marker sees two student submissions with very similar answers, they may refer to the journal to review the entries that indicate that both students performed the tasks independently.

Note: Public key , 1 and 3 ques , Need to complete 3 ques and public key and part in a screenshot

Attachment:- Advanced Network Security template.rar

Reference no: EM133505694

Questions Cloud

How to utilize the evidence-based medicine on daily practice : How to Utilize the Evidence-based medicine On Daily Practice as a Certified CardiovascularPerfusionist (CCP)
Determine ways to mitigate negative impact on responsibility : Determine ways to mitigate negative impacts on administrator responsibilities in three key areas of the Funding Equity policy. Refer to the Funding Equity.
What nonclinical data should be included in ind submission : What are the recommended primary and secondary endpoints for the Phase 3 trial? What are the expectations for the IND submission content and format?
Compare the methodology of macleish armor and anesthesia : Compare the methodology of MacLeish's(2012) Armor and Anesthesia: Exposure, Feeling, and the Soldier's Body and Atim, Mazurana and Mashak's (2018)
Perform an interception attack : Perform an interception attack. This assumes you have already setup and are familiar with virtnet. See Moodle and tutorial instructions
How the plan will impact not only k-twelve schools divisions : Based on the plan presented, discuss your position on how this plan will impact not only K-12 schools divisions, but higher education institutions as well.
Find an artifact of interest such as picture of an event : Explore the University of Akron's Center for the History of Psychology online archive database. Find an artifact of interest such as picture of an event
Explain how you would organize space time and materials : Explain how you would organize space, time, and materials/resources to maximize progress and promote social interaction amongst peers, parents, and caregivers.
Where a vaccine led to eradication of a significant : We have had a point where a vaccine led to eradication of a significant infectious disease and may be close to eliminating another.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd