Computer sciences and Information technology
Computer sciences and Information technology
1) describe the results of the PCAP and SNORT signatures which alerted from the captures you did in your course project; and 2) answers the questions outlined below.
Screen shots of alerts/SNORT signature references/PCAP snippets/graphs/ACID output are all allowed and encouraged. This paper is your opportunity to put all the tools together and provide a comprehensive analysis of HIDS/NIDS data that was collected over a few weeks during the project timeframes.
In addition to outlining the results of your course project, your five (5) page paper should also answer the following:
For SNORT and/or PCAP:
• Why did the signatures alert?
• What IP was the malicious host/s?
• What time did the possibly malicious traffic occur?
• Will it happen again?
• Is it normal network traffic?
• What can be done to prevent the traffic?
For Host Analysis (HIDS or log analysis):
• What logs did you analyze?
• What logs were signs of malicious activity?
• What was the malicious activity?
• What was the offending IP?
• What time/s did the activity occur?
• Will it happen again?
• Is it normal system activity?
• What can be done to prevent the activity?
• Can you explain all that you see on PCAP/NIDS/HIDS/Log analysis?
o If not, what can you deduce that the traffic/patterns/logs are?
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|