Security Vulnerabilities Assignment | Network Performance

Added on - 16 Sep 2019

  • Dissertation

    type

  • 4

    pages

  • 999

    words

  • 103

    views

  • 0

    downloads

Showing pages 1 to 2 of 4 pages
LEARNING OUTCOMESThis assignment is designed to link into the following Learning Outcomes ofthe ModuleCritically analyse a network stack at all OSI layers for securityvulnerabilitiesCritically appraise network performance in light of current hackerthreats determining best practice for security.Develop simple hacking tools that can either penetrate a network ordisable the function of a normal network.Critically appraise the structure for Internet, Intranet and Extranetsystems.This is achieved by developing several pieces of software, which will allowyou to gain an understanding of how services integrate over a network andhow protocols provide a communications infrastructure for Botnets.TASKSDesign a set of protocols that will allow a set of machines to carry out aDDOS (Distributed Denial Of Service) Attack.Design and build a suite of software that utilise the protocols to carryout a DDOS attack.Analyse the resultant network traffic highlighting the Botnet structureand the effects of the DDOS payload.Demonstrate the suite of programs on a set of designated clientsagainst a designated target (Linux Lab Machines in Network Lab).1
THE CHALLENGEYou are required to design and build a Botnet which is distributed over threelayers.2Handler toAgent ProtocolController toHandler ProtocolControllerAgentAgentAgentAgentHandlerHandler
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document