GROUP WORK NETWWORK SECURITY AND CRYPTOLOGY
GROUP WORK NETWWORK SECURITY AND CRYPTOLOGY
STUDENT INSTRUCTIONS
1. This form must be attached to the front of your assignment.
2. The assignment must be handed in without fail by submission date (see assessment schedule for your course)
3. Ensure that submission date is date stamped by the reception stuff when you hand it in.
4. Late submission will not be entertained unless with prior agreement with the tutor.
5. All assessable assignments must be word processed.
This assignment is intended to assess the student`s knowledge in all of the following areas.
However, greater emphasis should be given to those items marked with a
Command
o -c15000 - we are sending 15000 packets) at size of 120 bytes(-d 120) each
o SYN Flag (-S) enabled, with TCP window size of 64(-w 64)
o –p 80 =Direct the attck to http server
o –flood = Send the the apckets as fast as possible
o --rand-source = Generate spoofed IP addresses to disguies the real source and
avoid detection
o Stop the victim’s SYN-ACK reply packets from reaching the attcaker
Wireshark
Wireshark is the leading network protocol analyser globally, allowing you to examine
network activity in great detail. It is the de facto standard, and in many cases the
official standard, used widely across industries and educational institutions.
Port 80 was selected on Wireshark so as to monitor the traffic on the port
By opening protocol hierarchy statistics, we also see the unusual high volume of TCP packets
The Wireshark’s graph shows a massive spike in overall packets from near 0 to 2400 packets
a second.
o Network segmentation – This can limit the impact of a DoS attack by the creation of
VLANs, VPNs, and firewalls can limit the spread of an attack. The optimal solution is
zero trust micro segmentation. Adding device-level and device-cloaking firewalling,
external to the operating system remains the most reliable form of DoS protection.
Network security protocols are essential for protecting data integrity, confidentiality, and
availability in a networked environment.
Data Protection - Security protocols encrypt data in transit, ensuring that sensitive
information remains confidential and is protected from eavesdroppers.
Authentication - Protocols like SSL/TLS and Kerberos authenticate users and
devices, helping to ensure that only authorized entities can access network resources.
Integrity Assurance - These protocols verify that data has not been altered during
transmission. This helps prevent tampering and ensures data’s authenticity
Compliance and Regulation - Implementing security protocols helps organizations
comply with laws such as GDPR, HIPAA
Defense against Attacks – Protocols are designed to protect against various cyber
threats such as man-in-the-middle attacks, reply attacks, and unauthorized access
REFERENCE
How to prevent DDoS attacks | Methods and tools. Available at:
https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/ [Accessed on
26th October, 2024)
BYOS. Denial-of-Service (DoS) Attack Prevention: The Definitive Guide. Available
at: https://www.byos.io/blog/denial-of-service-attack-prevention [Accessed on 26th
October, 2024]
How to Perform TCP SYN Flood DoS Attack & Detect it with Wireshark - Kali Linux
hping3. Available at: https://www.firewall.cx/tools-tips-reviews/network-protocol-
analyzers/performing-tcp-syn-flood-attack-and-detecting-it-with-wireshark.html
[Accessed on 26th October, 2024]