Computer Science Homework Help

Computer Science Homework Help. CTEC 335 AACC Wireshark Filter Expressions for Packet Capture Project

 

Writing Wireshark filter expressions for packet capture

Note: Examples of student project reports will be made available to course instructors upon request.

Download Wireshark and install it on your computer. Search for online tutorials and other handy information, such as YouTube videos for using Wireshark.

Note: that Wireshark can be used to sniff wireless traffic

1.  Description

Write the exact packet capture filter expressions to accomplish the following:

Capture all TCP traffic to/from Facebook, during the time when you log in to your Facebook account

Capture all HTTP traffic to/from Facebook when you log in to your Facebook account

Find a popular YouTube video and play it while capturing all traffic to/from YouTube

After you run Wireshark with the above capture filters and collect the data, do the following:

Write a DISPLAY filter expression to count all TCP packets (captured under item #1) that have the flags SYN, PSH, and RST set. Show the fraction of packets that had each flag set.

Use a DISPLAY filter expression to separate the packets sent by your computer vs. received from Facebook and YouTube in items #2 and #3 above. Show the fractions for each type.

  1. Note:
  2. When sniffing out TCP packets, you will be receiving TCP packets, SSL packets, and HTTP packets. This is because HTTP/SSL run on top of TCP and you capture their packets by default because they are subclasses of TCP packets.
    So, capture them all and store in a local database.
    Then use display filters to separate the subset of TCP packets that are also HTTP packets. (You can do this by filtering only packets on port 80).
    Note that some of your sessions, e.g., Facebook, may be using secure HTTP (HTTP/SSL or HTTPS), which uses the port number 443.
  3. 2.  Captured Data Analysis

Count how many TCP packets you received from / sent to Facebook or YouTube, and how many of each were also HTTP packets.

Determine if any TCP packets with SYN or PSH flags set were sent from your host or received from Facebook/YouTube.
Go flag-by-flag and count how many packets have tcp.flags.push set, then how many have tcp.flags.syn set, and finally, how many have tcp.flags.reset set.
Report all three counts in a table.
Of course, you may do more. For example, you could find out if any packets had both PSH and RST set, or other flags not listed here.

  1. Draw a rough PowerPoint sketch with a timeline of your YouTube session (roughly 5 minutes, or whatever is the duration of your chosen video) and indicate approximately when during the session the packets with SYN or PSH flags occurred. Your timeline should start at the time when the first video packet is received and end when the last video packet is received. You don’t need to draw a precise timeline — just illustrate the relationships.
  2. Analyze if during a video session your client connected to multiple YouTube servers. Indicate approximately on the timeline where this occurred. Did packets with SYN or PSH flags occur at about the same time when your server changed? Provide some explanation as to why SYN/PSH packets were sent at all and if they were correlated with the server switching.

Analyze the YouTube packet sizes. Draw a histogram showing how many packets were received within a range of sizes. E.g., how many packets had length 0 – 100 bytes, 100 – 200 bytes, 200 – 300 bytes, etc. Indicate the packet size units (in bytes) on the horizontal axis.

3.  Report Preparation and Submission

The report should contain the following information:

Location where the experiments were run (University campus/lab, home, other) and the type of your computer.

Exact Wireshark filters used for capture and display.
To improve the readability of your report, provide the filter expressions in separate lines and use the Courier font to write the filters.

Explanation for every component of your filter expressions.

The exact URL for all YouTube videos that you visited for this experiment.

A table of observed statistics for counting the set flags in captured TCP packets.

Histogram of the YouTube packet lengths.

Sketch of the timeline of your YouTube session.

The list of references used during the data analysis and report preparation, such as websites, blogs, books, etc.

You may include your Wireshark *.pcap files as an appendix to your report

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Week 3 Antenna Types Radio Transmitter Paper

 

The purpose of an antenna in a radio transmitter is to launch the radio waves into space. In a receiver, the idea is to pick up as much of the transmitter’s power as possible and supply it to the tuner. The size of a radio antenna is directly related to the frequency of the signal that the antenna is trying to transmit or receive. List the different types of antennas and their applications. Find images that help describe the different antennas.

  • List the different antenna types, shapes and sizes, and their applications ; PLEASE use the uploaded files assist you

You will:

  1. List the different types of antennas and their applications.
  2. Find images to help describe the different antennas

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Storage Area Network Questions

 

The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

Define and describe a SAN.

Define and describe NAS.

Describe how cloud-based data storage works.

  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.
  • Note: You are required to use at least FOUR APA STYLE REFERENCES  to answer the above questions.  

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Lahore University Defending Against DDoS Discussion

 

I’m studying for my Cyber Security class and need an explanation.

Defending Against DDoS

Write a brief discussion of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. New England College CH10 Machine Executable and Macro Viruses Cyber Security Questions

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. CIS 510 Strayer Univeristy Software Solution Discussion

 

  • Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?
  • You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two or three alternative strategies, and explore related examples of situations for which each approach would be preferred and required.

Computer Science Homework Help