Is the activity occurring in packets 9-18 abnormal if so


Questions:

1. Is the activity occurring in packets 1-6 abnormal, in and of itself (that is, before you look at everything else in the packet)? If so, provide an interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

2. Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

3. Is the activity occurring in packets 31-405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible consequences. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

4. Is the activity occurring in packets 528-530 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

5. Is the activity occurring in packets 904-973 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

6. Is the activity occurring in packets 991-1293 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

7. Is the activity occurring in packets 1309-1405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

8. Is the activity occurring in packets 1406 to the end of the packet capture abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Is the activity occurring in packets 9-18 abnormal if so
Reference No:- TGS01040669

Expected delivery within 24 Hours