logo

COIT20262 Assignment 1 Submission

   

Added on  2023-01-04

7 Pages1721 Words59 Views
COIT20262 Assignment 1 Submission Term 1, 2019
COIT20262 - Advanced Network Security, Term 1, 2019
Assignment 1 Submission
Due date: 5pm Friday 26 April 2019 (Week 6) ASSESSMENT
Weighting: 40%
1Length: N/A
Student Name: enter your name
Student ID: id
Campus: campus
Tutor: tutor
Advanced Network Security Page 1 of 7

COIT20262 Assignment 1 Submission Term 1, 2019
Question 1. Packet Capture and Analysis
Part (c) Message Sequence Chart
Advanced Network Security Page 2 of 7

COIT20262 Assignment 1 Submission Term 1, 2019
Part (d) Information from Packets
Information Answer
Time between <ENTER> on TCP 10.110
Packet numbers for question above 11 and 13
IP address and port of UDP client 192.168.2.21 and 9697
MAC of UDP server 08:00:27:29:44:5a
Hex value of timestamp 080a0006de7600000000
Hex value of checksum 03f7
Part (e)
The utilised algorithm regarding the encryption process can be beneficial as the attacker that
is present on the node 2 will be not able to track or determine messages which are exchanged
between the node 1 and the mode 2. Thus the attacks such as man in the middle attack cab be
easily stopped in this case. The problem in this case can be easily stopped by creating public
keys and the public key pair of the RSA (Xiao, Wang and Jiang 2015). The message will be
signed using the private key and encryption can be done using the public key. Cypher texts
are send to the users in this type of cases.
Part (f)
Here the node 3 will be able to know the execution process of the attack. Packet verification
can be done by the server that are captured at the end of node 2 for the attack verification
whether it is performed or not. Database modification can be also identified through this
process.
Cookie stealing process is one of the main process for server access granting
(Dabrowskiet et al. 2016). With the cookie stealing attack grades can also be modified by
performing the SQL injection. This SQL injection can be performed by utilising harmful SQL
code and by using the fake servers.
Part (g)
The replay attacks can be harmful for the servers in such type of attack as server will be
totally unaware about the identity of a user as the identity can be forged (Kinnunen et al.
2017). Different users will be able to send messages to the server by acting as an
authenticated user and there will be no awareness in the server.
Advanced Network Security Page 3 of 7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20262 - Advanced Network Security Assignment 1 Submission
|7
|1514
|20

COIT20262 Assignment 1 Submission
|7
|1565
|52

Packet Capture and Analysis
|7
|1576
|364

COIT20262 - Advanced Network Security
|7
|1484
|89

Advanced Network Security Assignment 1 Submission
|9
|2226
|91

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|20
|1349
|252