logo

Networking and Internet Security Assignment

   

Added on  2022-09-02

1 Pages287 Words18 Views
Networking and Internet Security
Summary
The study analyses various networking protocols in use and how
can secure network environments.
The study aims to integrate additional security by implementing
intrusion prevention systems.
The study demonstrates configuration of routers and discusses
about protocol analysers.
Advantages
TCP/IP is a scalable client and server architecture enabling addition
of networks by not disrupting any current services.
The transfer of data is very fast and the protocol is easy to
implement and use.
Prediction and prevention of intrusions by IPS systems help in
detecting attacks that cannot be done by other security mechanisms.
Disadvantages
The working of the TCP/IP protocol is not generic by nature and
fails to represent other protocol stacks.
SSL encryption of HTTPS adds to the performance penalty that
users experience from the protocol.
Intrusion prevention systems can get quite expensive to implement
in the network.
Demonstration
Homem, I., Papapetrou, P. and Dosis, S., 2017. Entropy-based
prediction of network protocols in the forensic analysis of dns
tunnels. arXiv preprint arXiv:1709.06363.
Hui, X. and Qingde, H., 2016. The research on hopping covert
channel technique based on multi-protocol. DEStech Transactions
on Engineering and Technology Research, (ICMITE2016).
In conclusion the study successfully analyses network protocols
and intrusion prevention systems.
It also clearly demonstrates how routers can be configured and
protocol analysers can help identify protocol type..
Bibliography
The interconnect of two network systems is shown below.
The different networks can communicate together if the
routers are configured properly.
Below is shown the recording of network traffic by the protocol
analyser Wireshark.
Networking and Internet Security Assignment_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Organization and Network Analysis
|27
|5085
|18

TCP/IP Networking: Research, Configuration, and Services
|17
|1039
|169

Demonstration of Network Security Tools
|10
|2109
|85

Dynamic Host Configuration Protocol
|5
|670
|181

Designing an Intrusion Prevention System for SecureIT Pentesters
|11
|930
|464

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289