logo

Deep Packet Analysis

CyOps Portfolio Individual Assignment for the Cyber Operations module at the University of Hertfordshire

14 Pages2284 Words19 Views
   

Added on  2022-09-12

Deep Packet Analysis

CyOps Portfolio Individual Assignment for the Cyber Operations module at the University of Hertfordshire

   Added on 2022-09-12

ShareRelated Documents
Running head: DEEP PACKET ANALYSIS
Deep Packet Analysis
Name of the Student
Name of the University
Author Note
Deep                                  Packet Analysis_1
DEEP PACKET ANALYSIS1
Table of Contents
Introduction................................................................................................................................2
Statistical Analysis.....................................................................................................................2
Attack Identification...................................................................................................................2
Attack Explanation.....................................................................................................................3
Conclusion................................................................................................................................10
References................................................................................................................................12
Deep                                  Packet Analysis_2
DEEP PACKET ANALYSIS2
Introduction
While users on an individual basis carry out various searches on the internet, there is a
potential possibility of the sensitive data that belongs to the user can be stolen or used to
cause future damage to the user (Sanders, 2017). In this report, a Wireshark file has been
analysed in order to identify such threats that might be potentially active and acting upon the
activity of the user online. Wireshark provisions with the extensive interpretation of all the
traffic that is a common network of binary codes for identification of threats that might be
kept active by the potential hackers and might lead to serious consequences on the users end
(Chappell, 2017). Wireshark has been used for a number of advantages such as its
interpretive abilities along with the ability to record and monitor all the traffic that is present
on a single webpage and hence, has been used within this analysis to particular identify the
threat that might have been attacking and stealing personal information from the user who
had been browsing the webpages for personal usage.
Statistical Analysis
Using the statistical tools that share the existence within Wireshark provision with a
helping hand towards analysing the browsing activity of an individual user and help with the
identification of the attacks that are posed towards the users in general.
In this experiment we are observe different type of protocol. There are several kinds of
protocol are using such as DNS, TCP, ARP, HTTP, IGMPV3, SSH etc.
DNS:-
DNS is the domain name system and it is the distributed database applied in a
hierarchy of name servers. It is very much difficult to find out the protocol address which is
associated to a website because there are huge number of websites are able to create the
Deep                                  Packet Analysis_3
DEEP PACKET ANALYSIS3
several IP address instantly. It is a protocol within a set of standards for how the operating
systems exchange information on the internet and several private networks. Operating system
(Computer) and other network devices on the internet use a protocol address to route the user
request and trying to reach the final destination point. With the help of DNS protocol the user
are connect there server name, and manages through the database which can map in the
protocol.
In this attack there are several source are using in the DNS protocol. Several type of standard
query are using to these attack.
TCP:-
TCP is the transmission control protocol .TCP is defines the standard of the network
and also maintains the network conversation through the application program can exchange
data. Transmission protocol works with the IP and describes the operating systems which can
sends the every data packet. It is the standard and confirms a connection is maintained and
established until the exchange between the servers and receiving the complete message.
Deep                                  Packet Analysis_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Analysis Using Wireshark for Networked Application Management
|36
|2887
|458

Network Analysis Using Wireshark
|20
|2983
|459

Network Application Overview and Analysis
|18
|2466
|388

Wireshark: A Comprehensive Guide to Network Traffic Analysis
|23
|1709
|177

Cyber Operations | Report-1
|11
|2238
|15

Network Analysis using Wireshark
|13
|2657
|223