<em id="rw4ev"></em>

      <tr id="rw4ev"></tr>

      <nav id="rw4ev"></nav>
      <strike id="rw4ev"><pre id="rw4ev"></pre></strike>
      合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

      7CCSMNSE代做、代寫C++,Python程序語言
      7CCSMNSE代做、代寫C++,Python程序語言

      時間:2025-03-27  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



      Page 1 of 6
      6CCS3NSE/7CCSMNSE
      Network Security
      6CCS3NSE/7CCSMNSE Network Security 
      2023-24 Academic Year
      Coursework Specification
      Module title: Network security
      Module code: 6CCS3NSE/7CCSMNSE
      Coursework title: Network attack and defence
      Individual or group: This coursework can be done in a group or individually. The group 
      size depends on the experimental needs and is capped at a maximum 
      of 4. If working in a group, all group members are awarded the same 
      mark that is awarded to the submitted coursework. 
      Once you have formed a group offline, everyone must use the link 
      register your group. If you are doing the coursework individually then 
      you should register a group too, but your group will have just 1 
      member. 
      Weight of the overall assessment 
      for this module
      15%
      Learning outcomes assessed in 
      this coursework
      • Demonstrate knowledge of security properties for networks and 
      the principal approaches to guaranteeing those properties
      • Demonstrate an understanding of network attacks
      • Demonstrate an understanding of network defence
      Data work handed out: 9
      th February 2024
      Data work to be handed in: 24
      th April 2024
      Target date for the return of the 
      marked assignment:
      within 4 weeks of handed in
      Submission requirements: Each submission (individually or in a group) should contain a report 
      of maximally 1500 words or a video of maximum 15 minutes long. If 
      working in a group, 1 submission only is required per group.
      Page 2 of 6
      The goal of this coursework is to apply the knowledge and the understanding from the classroom in a real 
      network scenario. The overall task is to create a network, run and observe normal traffic, then launch 
      network attacks, and observe the impact on network performance. Finally use network defence 
      mechanisms to protect the network and observe the effectiveness. It contains several levels of tasks, and a 
      total mark of 100.
      Level 1: Build a network and test its connectivity (20 marks)
      At this level, you are supposed to build a network using the module VMs or mininet. 
      • Draw a diagram to show the topology of your network. Each computer on the diagram should have 
      its IP address labelled. 
      • Test connectivity of the network by using the ping command. 
      o If work in a group using VM, full connectivity between any two machines should be tested.
      You should also test the connectivity to the Internet on VM. 
      o If you use mininet, also show the connectivity between each host in your network. Hosts in 
      mininet can also be connected to the Internet but it requires extra configuration so is not 
      compulsory at this level. 
      Level 2: Generate and analyse traffic on your network (20 marks)
      At this level, you are supposed to generate some network traffic on your network, observe the traffic in 
      network sniffer(s) and measure network performance. This step is important as it builds the benchmark for 
      you to compare with later levels.
      • Generate traffic.
      o It is your choice of what kind of traffic you want to generate via standard Internet 
      applications or a tool you research and find to generate Internet traffic. 
      o You may use Internet applications to generate traffic. For example, you can open a web 
      browser on your VM. 
      o You may use the tool iperf to generate traffic such as UDP and TCP on your network. This 
      makes the volume of the traffic easily controllable. Iperf can be used on VM and mininet. 
      • Traffic analysis
      o Use tcpdump or wireshark to monitor the traffic.
      o Analyse the traffic at protocol level, packet level and flow level using wireshark
      • Network performance analysis
      o Analyse the performance of the TCP/UDP traffic such as throughput, delay and packet loss. 
      You can get the performance data from iperf output or wireshark statistics. 
      Level 3: Network attack(s) (25 marks)
      At this level, let’s see how network attacks impact the network. 
      • Generate normal traffic as you have done at level 2
      • Generate an attack or multiple attacks such as ICMP flooding, TCP SYN flooding, IP spoofing or any 
      other, when the normal traffic is ongoing
      o Remember you can use multiple machines/VMs or multiple hosts in mininet 
      o You can use hping3 or any other tools
      Page 3 of 6
      • Analyse how network attacks impact the network, via traffic analysis and network performance 
      analysis by comparing the results with that at level 2. 
      Level 4: Network defence (25 marks)
      At this level, let’s see how firewall(s) in your network can defend the victim from the attacks. 
      • Set a firewall on your network and configure its rules. You can use iptables on the VMs or in 
      mininet. You can also choose to use other firewalls. Multiple rules can be used for the defence.
      • Generate the normal traffic as you have done at level 2.
      • Generate the attacks as you have done at level 3. 
      • Show how the firewall works to mitigate the attacks.
      • Compare and analyse the performance of level 2, 3, and 4 to demonstrate the effectiveness of the 
      firewall.
      Level 5: Critical evaluation and reflection (10 marks)
      Critically evaluate what you have learnt from this coursework technically and socially. If you are in a group, 
      each of you must tell your role in the experiment (attacker/victim) and what you have contributed to the 
      design, development and running of the experiment. 
      Submission
      A report of maximum 1500 word that describes your experiments from level 1 to level 4 and analysis and
      includes the critical evaluation and reflection at level 5. The report should be a PDF file. 
      The report should be named as “24nse.gxxx.pdf”, where xxx is your group number. For example, if your 
      group number is 2, the filename should be “24nse.g001.pdf”.
      Or 
      A video of maximum 15 minutes that demonstrates the experiments from level 1 to level 4 and analysis, 
      and your verbal reflection at level 6. Each group member must say their reflection in the video. The video 
      should be an mp4 file. 
      The mp4 should be named as “24nse.gxxx.mp4”, where xxx is your group number. For example, if your 
      group number is 2, the filename should be “24nse.g001.mp4”.
      Marking
      Marking is based on the marking scheme above from evidence in the submitted report or video. See 
      marking rubrics next page. 
      Page 4 of 6
      Marking Rubrics
      Level 1: Build a network and test its connectivity (20 marks)
      Rubrics Marks
      Excellent description or demonstration of a network built in VM or mininet. 
      Network topology clearly drawn in report or shown in video with IP addresses of 
      nodes marked correctly. Connectivity fully tested and shown in report by 
      screenshots or in video by demonstration. 
      15-20
      A network built in VM or mininet. Network topology clearly drawn in report or 
      shown in video with IP addresses of nodes marked correctly. Connectivity fully 
      tested and shown in report by screenshots or in video by demonstration. 
      There could be minor slips in description or demonstration. 
      10-14
      A network built in VM or mininet. Network topology drawn in report or shown in 
      video with IP addresses of nodes marked. Some connectivity tested and shown
      in report by screenshots or in video by demonstration. 
      Errors are found in the drawing/testing. 
      Not all necessary screenshots are provided in report or demonstrations not 
      shown in video. 
      5-9
      Some attempt of building the network. 1-4
      No network is built. 0
      Level 2: Generate and analyse traffic on your network (20 marks)
      Rubrics Marks
      Excellent description or demonstration of sensible traffic generated on the 
      network built at level 1, using iperf or other tools of choice. Excellent traffic 
      analysis and network performance analysis.
      Screenshots of traffic generation and traffic analysis are included in report or 
      demonstrated in video submission. 
      15-20
      Good description or demonstration of sensible traffic generated on the network 
      built at level 1, using iperf or other tools of choice. Good traffic analysis traffic 
      analysis and network performance analysis.
      Screenshots of traffic generation and traffic analysis are included in report or 
      demonstrated in video submission. 
      10-14
      Some traffic generated on the network built at level 1, using iperf or other tools 
      of choice. Some traffic analysis and network performance analysis but may 
      contain some errors.
      5-9
      Page 5 of 6
      Limited screenshots of traffic generation and traffic analysis are included in 
      report or demonstrated in video submission. 
      Some attempt of generating the traffic and analysis. 1-4
      No attempt of generating traffic. 0
      Level 3: Network attack(s) (25 marks)
      Rubrics Marks
      Excellent description or demonstration of multiple network attacks executed in 
      the network. Excellent analysis on how network attacks impact the network via 
      traffic analysis and network performance analysis compared with level 2. 
      Screenshots of network attacks and analysis are included in report or 
      demonstrated in video submission.
      18-25
      Good description or demonstration of one or multiple network attacks executed 
      in the network. Good analysis on how network attacks impact the network via 
      traffic analysis and network performance analysis compared with level 2. 
      Screenshots of network attacks and analysis are included in report or 
      demonstrated in video submission.
      12-17
      Some attack(s) generated on the network but may not be completed. Some 
      analysis on how network attacks impact the network via traffic analysis and 
      network performance analysis but not well explained. 
      Limited screenshots of network attacks and analysis are included in report or 
      demonstrated in video submission.
      6-11
      Some attempt of generating attacks. 1-5
      No attempt of generating attacks. 0
      Level 4: Network defence (25 marks)
      Rubrics Marks
      Effective firewall rule setup to block the attack. Excellent description or 
      demonstration on how the firewall defends the network. Excellent traffic 
      analysis and performance evaluation through comparison of level 2, 3 and 
      4. 
      Screenshots of firewall setup and experiments are included in report or 
      demonstrated in video submission.
      18-25
      Good firewall rule setup to block the attack. Good description or 
      demonstration on how the firewall defends the network. Good traffic 
      12-17
      Page 6 of 6
      analysis and performance evaluation through comparison of level 2, 3 and 
      4.
      Screenshots of firewall setup and experiments are included in report or 
      demonstrated in video submission.
      Some firewall setup to block the attack but may not be effective. Some 
      description or demonstration on how the firewall defends the network. 
      There may be errors in traffic analysis and performance evaluation 
      through comparison of level 2, 3 and 4.
      Limited screenshots of firewall setup and experiments are included in report or 
      demonstrated in video submission.
      6-11
      Some attempt of defending the network 1-5
      No attempt of defending the network 0
      Level 5: Critical evaluation and reflection (10 marks)
      Rubrics Marks
      Critical evaluation and reflection both technical and social aspects. 6-10
      Some evaluation and reflection but may not be critical. 1-5
      No attempt 0

      請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp




       

      掃一掃在手機打開當前頁
    1. 上一篇:隨手用全國客服電話-隨手用24小時人工服務熱線
    2. 下一篇:代寫CDS526、代做c/c++,Python程序設計
    3. ·MISCADA代做、代寫Python程序語言
    4. ·代寫CSE 231、代做Python程序語言
    5. ·CIV6782代做、代寫Python程序語言
    6. ·CS305程序代做、代寫Python程序語言
    7. ·代寫FN6806、代做c/c++,Python程序語言
    8. ·代寫CS-UY 4563、Python程序語言代做
    9. ·&#160;COMP338編程代做、代寫Python程序語言
    10. ·CDS523編程代寫、代做Python程序語言
    11. ·COMP0035代做、代寫python程序語言
    12. ·代寫2530FNW、代做Python程序語言
    13. 合肥生活資訊

      合肥圖文信息
      出評 開團工具
      出評 開團工具
      挖掘機濾芯提升發動機性能
      挖掘機濾芯提升發動機性能
      戴納斯帝壁掛爐全國售后服務電話24小時官網400(全國服務熱線)
      戴納斯帝壁掛爐全國售后服務電話24小時官網
      菲斯曼壁掛爐全國統一400售后維修服務電話24小時服務熱線
      菲斯曼壁掛爐全國統一400售后維修服務電話2
      美的熱水器售后服務技術咨詢電話全國24小時客服熱線
      美的熱水器售后服務技術咨詢電話全國24小時
      海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
      海信羅馬假日洗衣機亮相AWE 復古美學與現代
      合肥機場巴士4號線
      合肥機場巴士4號線
      合肥機場巴士3號線
      合肥機場巴士3號線
    14. 上海廠房出租 短信驗證碼 酒店vi設計

      成人久久18免费网站入口