Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

So, essentially, we are to code a PCAP analyzer. It should return simple information about the PCAP file. Here is the full description: Summary: You

So, essentially, we are to code a PCAP analyzer. It should return simple information about the PCAP file.

Here is the full description:

image text in transcribed

Summary: You are given a darknet dataset representing one day of unsolicited Internet traffic The aim of the project is to build a cyber security capability that permits the inference (i.e., detection) and attribution of DDos flooding attacks by analyzing the darknet IP space. A complete project necessitates the development of a simplistic back-end and a front-end The back-end (1) aims at analyzing the dataset to infer sources of lP addresses which are related to DDoS flooding. The back-end should also (2) infer the type of the DDoS flooding (TCP Flooding, UDP Flooding or ICMP Flooding) and the rate (packets/sec) of the attack. The front-end will (1) geo-locate those DDoS source IP addresses to infer the city, the country and the Internet Service Provider (ISP) where the DDos is originating from. The front-end will also (2) have to display those DDoSIP addresses on a world map Summary: You are given a darknet dataset representing one day of unsolicited Internet traffic The aim of the project is to build a cyber security capability that permits the inference (i.e., detection) and attribution of DDos flooding attacks by analyzing the darknet IP space. A complete project necessitates the development of a simplistic back-end and a front-end The back-end (1) aims at analyzing the dataset to infer sources of lP addresses which are related to DDoS flooding. The back-end should also (2) infer the type of the DDoS flooding (TCP Flooding, UDP Flooding or ICMP Flooding) and the rate (packets/sec) of the attack. The front-end will (1) geo-locate those DDoS source IP addresses to infer the city, the country and the Internet Service Provider (ISP) where the DDos is originating from. The front-end will also (2) have to display those DDoSIP addresses on a world map

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design For Mere Mortals

Authors: Michael J Hernandez

4th Edition

978-0136788041

More Books

Students also viewed these Databases questions

Question

14-18 Compare the two major types of planning and control tools.

Answered: 1 week ago