logo

COIT20262 - Advanced Network Security Assignment

11 Pages1255 Words248 Views
   

Central Queensland University

   

Advanced Network Security (COIT20262)

   

Added on  2020-03-02

About This Document

COIT20262 - Advanced Network Security Assignment, This is an individual assignment, and it is expected students answer the questions themselves. Discussion of approaches to solving questions is allowed (and encouraged), however, each student should develop and write up their own answers.

COIT20262 - Advanced Network Security Assignment

   

Central Queensland University

   

Advanced Network Security (COIT20262)

   Added on 2020-03-02

ShareRelated Documents
Running head: ADVANCED NETWORK SECURITYAdvanced Network securityName of the StudentName of the UniversityAuthor’s Note
COIT20262 - Advanced Network Security Assignment_1
1ADVANCED NETWORK SECURITY Table of ContentsAnswer to Question 1: Analysis of Protocols with Wireshark............................................2Answer to Question 2: Web Application Attacks................................................................3Answer to Question 4: Network Attack Research...............................................................6Bibliography........................................................................................................................9
COIT20262 - Advanced Network Security Assignment_2
2ADVANCED NETWORK SECURITY Answer to Question 1: Analysis of Protocols with WiresharkCreation of topology 5 in virtnetFigure 1: Creation of topology 5(Source: Created by author)
COIT20262 - Advanced Network Security Assignment_3
3ADVANCED NETWORK SECURITY b. Message Sequence DiagramFigure 2: Message Sequence Diagram(Source: Created by author)c. The TCP connection is established and it takes 113.868023 millisecond of time for capturingthe packets.d. Milliseconds taken between the first and the second line is 113.864932 to 113.866512e. The port number for TCP client is 8567 and the port number for UDP client is 9567f. The same port number may not be used for communication and it changes with therequirement of the client or the type of service. Thus the port 80 is not always used for HTTPcommunication and act as a barrier for the identification of the application.g. The security analyst can block the unknown request and the data packets by knowing the portnumber of the client application.Answer to Question 2: Web Application Attacksa.
COIT20262 - Advanced Network Security Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20262 - Advanced Network Security | Assignment
|3
|999
|253

COIT20262 - Advanced Network Security
|12
|1899
|262

COIT20262 - Advanced Network Security | Wireshark
|3
|978
|100

Assignment on Analysis of Protocols with Wireshark
|8
|1194
|17

Advanced Network Security: Wireshark Analysis, Web Application Attacks, Cryptography Concepts, Trojan Download Research
|12
|1957
|154

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|20
|1349
|252