SNORT, Computer Network Security

Assignment Help:
Detect each visit to www.google.com that is made by the machine.
o Send an alert when an activity relating to network chat is detected.
o Send an alert when an attempt is made for DNS Zone transfer.
o Generate an alert when network traffic that indicates Viber, is being used.
o Alert for any packet of size > 100 bytes from the network 172.20.0.0 with SNM
255.240.0.0 designated to port 80.
o Alert for any packet that contains the following string “Hello”.
o Generate an Alert when there is an access to unauthorized sites. (You select the
web sites!)

Related Discussions:- SNORT

Perimeter Network Security System coursework, what is the guaranteed qualit...

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Sending an arp message, Normal 0 false false false EN-U...

Normal 0 false false false EN-US X-NONE X-NONE

Basic functions of e-mail system, B a s i c functions of e-mail system ...

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

Classification of networks, Computer networks are defined by four factors w...

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Compare the suitability and properties of isdn and adsl, Question : An a...

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Explain the concept of zero knowledge proofs, (a) Describe the concept of ...

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Configuration for 3des, (a) Explain the two possible configuration for 3DE...

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd