SlideShare a Scribd company logo
1 of 7
CSEC 640 - Week 4 Individual Assignment #1
For more classes visit
www.snaptutorial.com
CSEC640 - Weeks 4 and 5 Individual Assignment
Description
The course module #4 covers very important concepts of how Denial of
Service (DoS) attacks work.
However, the module does not discuss detection, prevention, or
mitigation of DoS attacks (or
Distributed DoS). The task of this individual assignment is to write a
research paper/report in these
topics.
Topic of the Paper:
Technique(s) or scheme(s) or method(s) for detecting, preventing or
mitigating DoS or
Distributed DoS (DDoS) attacks.
Assignment Guidelines
The following must be considered when you write the report:
1. Select 4 research papers (in addition to those provided/suggested for
the class) which
discuss detection, prevention, or mitigation techniques for DoS or DDoS
attacks:
a. The research papers must be published by a peer reviewed journal or
be published in
conference proceedings (e.g., IEEE, ACM, IBM Systems Journal,
Lecture Notes in
Computer Science (LNCS), etc.).
b. You must not choose papers or research works from magazines or
periodicals that are
not research-oriented (e.g., Wikipedia, SANS, etc.).
c. Briefly explain your rationale for selecting a specific research paper.
d. Allocate sufficient time to read the research papers. Reading a
research paper
requires more time than most people realize.
2. Summarize each research paper and identify the detection, mitigation,
or prevention
techniques described in the papers you selected. You are expected to
base your paper on
research that you have found through the library sources along with the
papers
provided/suggested for the class. The first paper is selected because of
presentation of a
detection technique; the second paper is selected because of a
presentation of a prevention
technique, and the third paper because of the presentation of a mitigation
technique. Finally, a
fourth research paper that involves a combination of the three topics.
You can select 3 papers
if you can justify that the depth and completeness of the selected papers
cover the topics of
your research paper. Otherwise, a selection of at least 4 papers is
advisable.
3. Describe how each technique works. Clearly describe (in detail using
your own words), how
each technique works. Assume that you are explaining the author’s
technique to
someone with a fairly strong fundamental knowledge in network and
security (e.g., a first
year computer science graduate student) and assume the student has no
knowledge of the
author’s research (never read the article before). Discuss each technique
or method using
the following questions:
a. Is the proposed technique a promising, practical approach which can
be effectively
implemented into an existing platform? Clearly explain your answer.
b. What are the strengths and weaknesses (limitations) of this technique?
4. Make sure there are No IPR(Intellectual Property Right) issues. This
requires the following:
a. Re-draw all figures and tables.
b. Summarize all concepts using your own words.
c. Do not copy any part of text or unmodified figures (short quotes are
acceptable.)
d. Cite references as needed using APA format.
5. To support your claims or statements, you may also cite/reference
other papers and sources
from the reading assignments and outside peer reviewed and non-peer
reviewed papers and
journals (including white papers, SANs documents, etc.; do not have to
be academic papers or
articles, however, no Wikipedia or blogs).
********************************************************
CSEC 640 Lab 1
For more classes visit
www.snaptutorial.com
CSEC 640 Lab 1
********************************************************
CSEC 640 Lab2 Assignment
For more classes visit
www.snaptutorial.com
CSEC 640 Lab2 Assignment
Objectives: Use Snort & Wireshark for Intrusion Detection
Total Points: 100 points (weight: 10% of course grade)
Due date: By the end of Week 7
Goal of the Lab: This lab is intended to provide experience with the
Snort and Wireshark programs. Snort is a simple and powerful network
monitoring agent. You are given a packet trace data file (snort.out)
posted in Week 7 conference and you are asked to write snort rules to
identify specific packet types based on the packet data file.
General Directions:
1. Please submit ONE Word document with a cover page and your
answers to all 4 Lab2 questions and sub-questions on Pages 7 and 8
below to Lab2 assignment folder.
2. Please include each original question before your answer. Cite and list
research sources used per APA format.
3. You are not required to submit this individual assignment to
Turnitin.com. However, the instructor will run the submission in
Turnitin if there is any question on the originality of the submission.
4. Name your Word lab answer file in this format: Lab2-YourLastname
********************************************************
General Directions:
1. Please submit ONE Word document with a cover page and your
answers to all 4 Lab2 questions and sub-questions on Pages 7 and 8
below to Lab2 assignment folder.
2. Please include each original question before your answer. Cite and list
research sources used per APA format.
3. You are not required to submit this individual assignment to
Turnitin.com. However, the instructor will run the submission in
Turnitin if there is any question on the originality of the submission.
4. Name your Word lab answer file in this format: Lab2-YourLastname
********************************************************

More Related Content

Similar to Csec 640 Enthusiastic Study / snaptutorial.com

Csec 640 Success Begins - snaptutorial.com
Csec 640  Success Begins - snaptutorial.comCsec 640  Success Begins - snaptutorial.com
Csec 640 Success Begins - snaptutorial.comWilliamsTaylorz
 
Final ProjectCreate a Security Lab Tutorial Look back to t
Final ProjectCreate a Security Lab Tutorial Look back to tFinal ProjectCreate a Security Lab Tutorial Look back to t
Final ProjectCreate a Security Lab Tutorial Look back to tChereCheek752
 
TaskBelow are listed a list of topics. You are required to -Sele.docx
TaskBelow are listed a list of topics. You are required to -Sele.docxTaskBelow are listed a list of topics. You are required to -Sele.docx
TaskBelow are listed a list of topics. You are required to -Sele.docxjohniemcm5zt
 
ISSC362Course SummaryCourse ISSC362 Title IT Securit
ISSC362Course SummaryCourse  ISSC362 Title  IT SecuritISSC362Course SummaryCourse  ISSC362 Title  IT Securit
ISSC362Course SummaryCourse ISSC362 Title IT SecuritTatianaMajor22
 
SEC 420 Entire Course NEW
SEC 420 Entire Course NEWSEC 420 Entire Course NEW
SEC 420 Entire Course NEWshyamuopuop
 
Technology Review #1 Emerging Application of Technology (Cons.docx
Technology Review #1 Emerging Application of Technology (Cons.docxTechnology Review #1 Emerging Application of Technology (Cons.docx
Technology Review #1 Emerging Application of Technology (Cons.docxssuserf9c51d
 
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docx
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docxNew folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docx
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docxhenrymartin15260
 
Assessment Type Assignment 1 .docx
Assessment Type Assignment 1                                 .docxAssessment Type Assignment 1                                 .docx
Assessment Type Assignment 1 .docxfredharris32
 
Guidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationGuidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationAprilJoyDanielBigorn
 
Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)randomP786
 
Drexel University, College of Engineering2015-2016 Academic Year.docx
Drexel University, College of Engineering2015-2016 Academic Year.docxDrexel University, College of Engineering2015-2016 Academic Year.docx
Drexel University, College of Engineering2015-2016 Academic Year.docxjacksnathalie
 
Root cause of community problem for this discussion, you will i
Root cause of community problem for this discussion, you will iRoot cause of community problem for this discussion, you will i
Root cause of community problem for this discussion, you will issusere73ce3
 
INF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comINF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comrock1234548
 
INF 103 Course Success is a Tradition / newtonhelp.com
INF 103 Course Success is a Tradition / newtonhelp.comINF 103 Course Success is a Tradition / newtonhelp.com
INF 103 Course Success is a Tradition / newtonhelp.comrock1234599
 
INF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comINF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comrock1234546
 
Using Computer as a Research Assistant in Qualitative Research
Using Computer as a Research Assistant in Qualitative ResearchUsing Computer as a Research Assistant in Qualitative Research
Using Computer as a Research Assistant in Qualitative ResearchJoshuaApolonio1
 

Similar to Csec 640 Enthusiastic Study / snaptutorial.com (20)

Csec 640 Success Begins - snaptutorial.com
Csec 640  Success Begins - snaptutorial.comCsec 640  Success Begins - snaptutorial.com
Csec 640 Success Begins - snaptutorial.com
 
Final ProjectCreate a Security Lab Tutorial Look back to t
Final ProjectCreate a Security Lab Tutorial Look back to tFinal ProjectCreate a Security Lab Tutorial Look back to t
Final ProjectCreate a Security Lab Tutorial Look back to t
 
7th sem
7th sem7th sem
7th sem
 
7th sem
7th sem7th sem
7th sem
 
TaskBelow are listed a list of topics. You are required to -Sele.docx
TaskBelow are listed a list of topics. You are required to -Sele.docxTaskBelow are listed a list of topics. You are required to -Sele.docx
TaskBelow are listed a list of topics. You are required to -Sele.docx
 
ISSC362Course SummaryCourse ISSC362 Title IT Securit
ISSC362Course SummaryCourse  ISSC362 Title  IT SecuritISSC362Course SummaryCourse  ISSC362 Title  IT Securit
ISSC362Course SummaryCourse ISSC362 Title IT Securit
 
SEC 420 Entire Course NEW
SEC 420 Entire Course NEWSEC 420 Entire Course NEW
SEC 420 Entire Course NEW
 
Technology Review #1 Emerging Application of Technology (Cons.docx
Technology Review #1 Emerging Application of Technology (Cons.docxTechnology Review #1 Emerging Application of Technology (Cons.docx
Technology Review #1 Emerging Application of Technology (Cons.docx
 
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docx
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docxNew folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docx
New folderCSE2AIF 2015 Assignment 2.pdfCSE2AIF - Artifi.docx
 
Assessment Type Assignment 1 .docx
Assessment Type Assignment 1                                 .docxAssessment Type Assignment 1                                 .docx
Assessment Type Assignment 1 .docx
 
Guidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationGuidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertation
 
Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)
 
Drexel University, College of Engineering2015-2016 Academic Year.docx
Drexel University, College of Engineering2015-2016 Academic Year.docxDrexel University, College of Engineering2015-2016 Academic Year.docx
Drexel University, College of Engineering2015-2016 Academic Year.docx
 
Root cause of community problem for this discussion, you will i
Root cause of community problem for this discussion, you will iRoot cause of community problem for this discussion, you will i
Root cause of community problem for this discussion, you will i
 
INF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comINF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.com
 
INF 103 Course Success is a Tradition / newtonhelp.com
INF 103 Course Success is a Tradition / newtonhelp.comINF 103 Course Success is a Tradition / newtonhelp.com
INF 103 Course Success is a Tradition / newtonhelp.com
 
INF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.comINF 103 Future Our Mission/newtonhelp.com
INF 103 Future Our Mission/newtonhelp.com
 
qualitative.ppt
qualitative.pptqualitative.ppt
qualitative.ppt
 
Using Computer as a Research Assistant in Qualitative Research
Using Computer as a Research Assistant in Qualitative ResearchUsing Computer as a Research Assistant in Qualitative Research
Using Computer as a Research Assistant in Qualitative Research
 
4200 (1).pdf
4200 (1).pdf4200 (1).pdf
4200 (1).pdf
 

Recently uploaded

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Csec 640 Enthusiastic Study / snaptutorial.com

  • 1. CSEC 640 - Week 4 Individual Assignment #1 For more classes visit www.snaptutorial.com CSEC640 - Weeks 4 and 5 Individual Assignment Description The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work. However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or Distributed DoS). The task of this individual assignment is to write a research paper/report in these topics. Topic of the Paper: Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks. Assignment Guidelines The following must be considered when you write the report:
  • 2. 1. Select 4 research papers (in addition to those provided/suggested for the class) which discuss detection, prevention, or mitigation techniques for DoS or DDoS attacks: a. The research papers must be published by a peer reviewed journal or be published in conference proceedings (e.g., IEEE, ACM, IBM Systems Journal, Lecture Notes in Computer Science (LNCS), etc.). b. You must not choose papers or research works from magazines or periodicals that are not research-oriented (e.g., Wikipedia, SANS, etc.). c. Briefly explain your rationale for selecting a specific research paper. d. Allocate sufficient time to read the research papers. Reading a research paper requires more time than most people realize. 2. Summarize each research paper and identify the detection, mitigation, or prevention techniques described in the papers you selected. You are expected to base your paper on research that you have found through the library sources along with the papers provided/suggested for the class. The first paper is selected because of presentation of a
  • 3. detection technique; the second paper is selected because of a presentation of a prevention technique, and the third paper because of the presentation of a mitigation technique. Finally, a fourth research paper that involves a combination of the three topics. You can select 3 papers if you can justify that the depth and completeness of the selected papers cover the topics of your research paper. Otherwise, a selection of at least 4 papers is advisable. 3. Describe how each technique works. Clearly describe (in detail using your own words), how each technique works. Assume that you are explaining the author’s technique to someone with a fairly strong fundamental knowledge in network and security (e.g., a first year computer science graduate student) and assume the student has no knowledge of the author’s research (never read the article before). Discuss each technique or method using the following questions: a. Is the proposed technique a promising, practical approach which can be effectively implemented into an existing platform? Clearly explain your answer.
  • 4. b. What are the strengths and weaknesses (limitations) of this technique? 4. Make sure there are No IPR(Intellectual Property Right) issues. This requires the following: a. Re-draw all figures and tables. b. Summarize all concepts using your own words. c. Do not copy any part of text or unmodified figures (short quotes are acceptable.) d. Cite references as needed using APA format. 5. To support your claims or statements, you may also cite/reference other papers and sources from the reading assignments and outside peer reviewed and non-peer reviewed papers and journals (including white papers, SANs documents, etc.; do not have to be academic papers or articles, however, no Wikipedia or blogs). ******************************************************** CSEC 640 Lab 1 For more classes visit
  • 5. www.snaptutorial.com CSEC 640 Lab 1 ******************************************************** CSEC 640 Lab2 Assignment For more classes visit www.snaptutorial.com CSEC 640 Lab2 Assignment Objectives: Use Snort & Wireshark for Intrusion Detection Total Points: 100 points (weight: 10% of course grade) Due date: By the end of Week 7 Goal of the Lab: This lab is intended to provide experience with the Snort and Wireshark programs. Snort is a simple and powerful network monitoring agent. You are given a packet trace data file (snort.out) posted in Week 7 conference and you are asked to write snort rules to identify specific packet types based on the packet data file.
  • 6. General Directions: 1. Please submit ONE Word document with a cover page and your answers to all 4 Lab2 questions and sub-questions on Pages 7 and 8 below to Lab2 assignment folder. 2. Please include each original question before your answer. Cite and list research sources used per APA format. 3. You are not required to submit this individual assignment to Turnitin.com. However, the instructor will run the submission in Turnitin if there is any question on the originality of the submission. 4. Name your Word lab answer file in this format: Lab2-YourLastname ********************************************************
  • 7. General Directions: 1. Please submit ONE Word document with a cover page and your answers to all 4 Lab2 questions and sub-questions on Pages 7 and 8 below to Lab2 assignment folder. 2. Please include each original question before your answer. Cite and list research sources used per APA format. 3. You are not required to submit this individual assignment to Turnitin.com. However, the instructor will run the submission in Turnitin if there is any question on the originality of the submission. 4. Name your Word lab answer file in this format: Lab2-YourLastname ********************************************************