Wireshark analysis Protocol analysis involves the identification of basic knowledge objects within a protocol. Protocol analysts know how to employ esoteric hardware and software tools to examine traffic in motion across a network. Furthermore, they know how to decode and understand the implications of what they see in that data stream, where network pathologies, outside or inside attacks, poorly designed applications, and strange network layouts, among many other causes, can make life interesting. Protocol definition can be expanded, abused or violated. For this report, choose an interesting protocol behaviour relevant to CPS security, such as an unusual flag combination, a protocol abuse or violation, a recognisable behavioural pattern (e.g. a connectivity problem), an attack, a virus, etc., for analysis. A comprehensive list of capture files that can be opened in Wireshark is available, for example, at http://www.netresec.com/?page=PcapFiles. Use one of these captures (from, e.g., the section on Industrial Control Systems) to support your analysis. Alternatively, generate and capture network traffic with one of the aforementioned behaviours. Using the capture file and Wireshark to support your analysis, write on the topic chosen with at least 2 academic references or books. The document you upload on Canvas should contain some extracts of the file you have used for your analysis. All references should be in conformity with the Harvard referencing style..