Network traffic analysis

Network traffic analysis.

Cyber Operations – Assessment 2 – Network traffic analysis

Submit Assignment

Due 14 Jan 2021 by 23:59

Points 50

Submitting a file upload

File types pdf

The full assignment 2 brief can be found here.

This is an individual assessment. It is expected that your report will be in the region of 1500 words.

You are expected to conduct an analysis of this network packet capture, using Wireshark. You are required to present your findings in a factual manner, to convince decision makers of a large corporation on business strategies.

The analysis rig you will have to use for this activity is setup in the CSC Labs but because of UH policies on Covid-19, you will have to use Wireshark from your own device. You can download the latest version of Wireshark from here (Links to an external site.).

The deadline for this assignment is on the 14.01.2021 by electronic submission via Canvas.

Please see the table underneath for the expected structure of the report and for the breakdown of the marks. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for supporting your arguments, and an appropriate referencing style as per the University regulations.

Assignment 2 Structure and Criteria Mark Available

Statistical analysis (network boundaries, active nodes, external sources, type of traffic and protocols) 20

Activity narrative and attack identification (of one attack) 20

Attack technical explanation (of one attack) 10

Total 50

Submission Requirements:

You are required to submit a PDF report using the submission link provided on Canvas. You are expected to demonstrate an insight into the implications of the problem by using clear and concise arguments. The report should be well written, showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative. Remember, cyber operators report on facts and avoid opinions and generalisations!

Network traffic analysis

Posted in Uncategorized