+1(316)4441378

+44-141-628-6690

Computer sciences and Information technology

Computer sciences and Information technology

1) describe the results of the PCAP and SNORT signatures which alerted from the captures you did in your course project; and 2) answers the questions outlined below.
Screen shots of alerts/SNORT signature references/PCAP snippets/graphs/ACID output are all allowed and encouraged. This paper is your opportunity to put all the tools together and provide a comprehensive analysis of HIDS/NIDS data that was collected over a few weeks during the project timeframes.
In addition to outlining the results of your course project, your five (5) page paper should also answer the following:
For SNORT and/or PCAP:
• Why did the signatures alert?
• What IP was the malicious host/s?
• What time did the possibly malicious traffic occur?
• Will it happen again?
• Is it normal network traffic?
• What can be done to prevent the traffic?
For Host Analysis (HIDS or log analysis):
• What logs did you analyze?
• What logs were signs of malicious activity?
• What was the malicious activity?
• What was the offending IP?
• What time/s did the activity occur?
• Will it happen again?
• Is it normal system activity?
• What can be done to prevent the activity?
• Can you explain all that you see on PCAP/NIDS/HIDS/Log analysis?
o If not, what can you deduce that the traffic/patterns/logs are?

ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

# topic title discipline academic level pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min
[order_calculator]