How you can recognize any attack signatures in the packets


Assignment: Packet Capture Analysis

You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:

Go to the Wireshark Sample Captures site, and download the following:

i. wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic
ii. wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample
iii. nb6-hotspot.pcap Someone connecting to SFR's wireless community network
iv. ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0
v. wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer's system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1 page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

i. Description of the traffic
ii. Description of the risks, if any, the traffic poses to the wireless network
iii. Countermeasures to take to secure network from any threat

Write a 1/2 to 1 page memo to management as a network security specialist explaining the following:

i. How you can distinguish hostile packet data from normal packet data?
ii. How you can recognize any attack signatures in the packets you analyze?
iii. Provide a rationale for ranking the packets as you did.

Format your assignment according to the following formatting requirements:

o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

o The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Networking: How you can recognize any attack signatures in the packets
Reference No:- TGS03039387

Now Priced at $30 (50% Discount)

Recommended (95%)

Rated (4.7/5)