Identify most common intrusion detection attacks

Assignment Help Computer Networking
Reference no: EM131618019

Purpose of the assessment

a) Discuss common threats and attacks on networked information systems

b) Identify most common intrusion detection attacks, and discuss how to prevent them

c) Apply skills to analyse complex problems in network security under supervision

Assignment Description

For this assignment you will evaluate one of the Network Security tools from Table 1. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a 4-5 min video presentation on the following:

1. Download and install (on your computer or on MIT Virtual box) one of the Security Tool from Table 1.

2. Demonstrate (narration of your actions recorded by video) 4 tasks the software can perform.

3. Outline of your presentation.

4. Usability of the tool.

5. Present the results in a video presentation.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the Security Tool.

Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (210 seconds approximately) + Usability of the Tool (15 seconds approximately) + Conclusion (15 secs approximately, with appearance)

Table 1 Network Security Tool

Serial #

Software

Description

1

Snort

Snort is an open source intrusion prevention system for windows and unix. The software enables users to monitor real time traffic and carry out packet logging.

 

2

Kismet Wireless

Kismet is an 802.11 wireless network detector. Kismet could be used to log traffic and plot detected networks.

3

Open SSH

Open SSH is an open source security tool, which could be used for remote login to the SSH protocol. Open SSH also enables the user to perform secure tunneling.

4

Nessus

Nessus is a licensed software for vulnerability scanning, however a free trial version is available. Nessus could be used to scan for viruses, malware, backdoors, and hosts communicating with botnet-infected systems.

5

Security Onion

Security Onion is based on Ubuntu. Security Onion provides solutions for intrusion detection, network security monitoring and log management.

You may use any of the available open source software for screen capture.

Verified Expert

The solution file is prepared on ms power point and it has discussed about the security tool snort. This report has outline of presentation,demonstration, use of snort tool and conclusion. Some of the screen shot of snort is attached in the solution and references are included as per IEEE format.

Reference no: EM131618019

Questions Cloud

Describe the four challenges of organization design : What are the advantages and disadvantages of centralized purchasing? Describe the four challenges of organization design.
Prepare an acquisition analysis : Prepare an acquisition analysis and the consolidation journal entries necessary for preparation of the consolidated financial statements
Which one of the ps gets you to purchase - a great price : Does some Wizard of Oz person-behind-the-curtain get you to buy something by manipulating you through the 7 Ps?
Define the initial intentions captured in a memorandum : define the initial intentions captured in a memorandum of understanding, service level agreement, letters of intent, or other written or verbal understanding.
Identify most common intrusion detection attacks : MN502 - Demonstration of a network security tool Discuss common threats and attacks on networked information systems - Identify most common intrusion detection attacks
Analyze the balance of local standardized products globally : Analyze the balance of local standardized products globally.Discuss how cultural differences are considered and managed.
How would the standard report be modified : What type of opinion(s) would the audit team issue on the effectiveness of internal control over financial reporting if a material weakness in internal control.
Advantages and disadvantages of documenting internal control : What are the advantages and disadvantages of documenting internal control by using an internal control questionnaire?
Current international-business-related issues : The Current paper allows students to learn about current international-business-related issues such as President Trump's initiatives on international trade

Reviews

inf1618019

10/13/2017 4:39:54 AM

I have used this service so many times and i am always surprised by the quality of work and the speed in which it is done. Thank you so much.

inf1618019

10/13/2017 4:39:22 AM

Please found attachment I am sending you a file. 24807589_1MN502 T2 Assignment 1 MEL SYD.pdf 24807582_1IMG 2048.PNG Please add some diagrams in slides and make slides enough so that I could record or make presentation only for 4-5 minutes. Also send me the text or quotes which I have to record. List references. Have you started work on assignment? Actually my this assignment is due today. So please send me as soon as possible.

len1618019

8/29/2017 5:39:29 AM

Demonstrati on/10 Very profession- al, clear and easy to follow. Professional, clear and easy to follow Clear and easy to follow but lacks professionalism Difficult to follow Tasks have not been demonstrated Usability/3 Clear, professional and easy to follow Clear professional usability Well discussed usability Usability Discussed Usability is difficult to understand Conclusion/2 A very powerful conclusion with full confidence. Very Good Conclusion Appearance made and good conclusion provided Appearance made and conclusion provided. Barely appear at the end of the video.

len1618019

8/29/2017 5:39:21 AM

Marking Rubric for Assignment #1: Total Marks 20 Grade Mark HD 16-20 DI 14-15 CR 12-13 P 10-11 Fail <10 Excellent Very Good Good Satisfactory Unsatisfactory Introduction/ 2 Appearance is clear, easy to follow, well prepared and professional Appearance is clear and easy to follow. Appearance is clear and understandable Makes an appearance and provides an introduction. Does not make an appearance in the video at the start of video Outline/3 Create a very nice bullet point outline and well presented it before the demonstration started A bullet point outline is provided and presented before the start of the presentation Explained but no screen showing a written outline Very difficult to understand overview. The overview is hardly there, missing explanation

len1618019

8/29/2017 5:39:01 AM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Section to be included in the report Description of the section Marks Introduction Student should introduce with his/her physical appearance in the video. 2 Outline Outline of the whole presentation. 3 Demonstration Demonstrate (narration of your actions recorded by video) all steps from the respective project. 4*2.5 = 10 Usability of the tool Discuss the applications of the tool 3 Conclusion With appearance, draw a conclusion on your experience with the Security Software. 2 Total 20

len1618019

8/29/2017 5:38:51 AM

Submission Guidelines: 1. Name your video with your student number and name. 2. Upload Video on your Youtube account 3. Copy the Video Link to a file and 4. Email me the link in a word document including your student ID To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right-hand corner of your youtube.com webpage. Make sure you copy+paste your video URL in word document for your marker to be able to watch and mark it!

len1618019

8/29/2017 5:38:41 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (210 seconds approximately) + Usability of the Tool (15 seconds approximately) + Conclusion (15 secs approximately, with appearance)

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd