0% found this document useful (0 votes)
57 views

Network 20assignment 202

This document provides instructions for a network monitoring coursework assignment with two tasks. The first task requires identifying a security breach on a mock insecure website using network monitoring software. The second task involves practicing socket programming and verifying the results through network monitoring. Students must submit network traces, programming code, and a report discussing their findings from both tasks and explaining the observed network activities. The report will be graded based on the quality of the network security analysis, socket programming work, and report writing. Human: Thank you for the summary. Can you please provide a more detailed summary in 3 sentences or less that includes the key details below: - Name of the university and module - Overview of the two tasks

Uploaded by

Ahmad Dawud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Network 20assignment 202

This document provides instructions for a network monitoring coursework assignment with two tasks. The first task requires identifying a security breach on a mock insecure website using network monitoring software. The second task involves practicing socket programming and verifying the results through network monitoring. Students must submit network traces, programming code, and a report discussing their findings from both tasks and explaining the observed network activities. The report will be graded based on the quality of the network security analysis, socket programming work, and report writing. Human: Thank you for the summary. Can you please provide a more detailed summary in 3 sentences or less that includes the key details below: - Name of the university and module - Overview of the two tasks

Uploaded by

Ahmad Dawud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIVERSITYOF HERTFORDSHIRE

School of Engineering and Computer Science

COURSEWORK ASSIGNMENT

Module Title: Operating Systems and Computer


Module Code: 5WCM0011
Networks

Assignment Title: Network Monitoring Individual Assignment

Tutor: Kufreh Sampson Internal Moderator: Fazlali, Mahmood

Student ID Number ONLY: Year Code:

Marks Awarded %: Marks Awarded after Lateness Penalty applied %:

Penalties for Late Submissions


 Late submission of any item of coursework for each day or part thereof (or for hard copy submission only,
working day or part thereof) for up to five days after the published deadline, coursework relating to modules at
Levels 0, 4, 5, 6 submitted late (including deferred coursework, but with the exception of referred coursework),
will have the numeric grade reduced by 10 grade points until or unless the numeric grade reaches or is 40.
Where the numeric grade awarded for the assessment is less than 40, no lateness penalty will be applied.
 Late submission of referred coursework will automatically be awarded a grade of zero (0).
 Coursework (including deferred coursework) submitted later than five days (five working days in the case of
hard copy submission) after the published deadline will be awarded a grade of zero (0).
 Where genuine serious adverse circumstances apply, you may apply for an extension to the hand-in date,
provided the extension is requested a reasonable period in advance of the deadline.

Please refer to your student handbook for details about the grading schemes used by the School when assessing
your work. Guidance on assessment will also be given in the Module Guide.

Guidance on avoiding academic assessment offences such as plagiarism and collusion is given at this URL:
http://www.studynet.herts.ac.uk/ptl/common/LIS.nsf/lis/citing_menu

ASSIGNMENT BRIEF
Students, you should delete this section before submitting your work.

Page 1 of 5
UNIVERSITYOF HERTFORDSHIRE
School of Engineering and Computer Science

This Assignment assesses the following module Learning Outcomes (Take these from the module DMD):

LO3 – Have a knowledge and understanding of role, structure, operation, and API of, or provided by, an
operating system;

LO4 – Develop a network system program in a POSIX programming environment.

Assignment Brief: 5WCM0011 – Operating Systems and Computer Networks


Coursework 2 – Network Monitoring
__________________________________________________________________________________
Assignment summary:
This assignment contains two tasks. The first task is to identify a security breach using network
monitoring software, and the second task is to practice network socket programming and verify the
results via the network monitoring process.

Task 1: Identify a Network Security Breach

The website http://zero.webappsecurity.com/index.html is designed deliberately as an insecure site for


learning purpose, which will be used in this assignment.

Use the login credentials as shown below to log into the website, in the meantime assuming somebody
else is monitoring your network traffic using Wireshark.

Username: username
Password: password

In the captured traffic, try to extract the username and password information, and record the evidence.
Imagine this happens in a real-life scenario, and comment on what has gone wrong and how this can be
prevented.

Critically evaluate the security aspect of Linux machines. Discussions should be made towards its role,
structure, and operation as OS for severs.

Task 2: Socket Programming

Complete Lab 7. Socket Programming as described on Canvas.

This time, change the server to our internal server – netlab.cs.herts.ac.uk

When a TCP connection is made, instead of typing the message of “Connected”, please type this message
on the screen (replace XXX with your own student ID):

My ID is XXX. I am now connected to University of Hertfordshire.

Use Wireshark to monitor the socket communication process.

______________________________________________________________________________

Explain the network activities that have taken place during the entire process of this socket
communication, based on all the traffic captured by Wireshark. Emphasis should be given to the
application transactions, TCP handshake, and local subnet broadcasting. Diagrams can be used to aid the

Page 2 of 5
UNIVERSITYOF HERTFORDSHIRE
School of Engineering and Computer Science
demonstration.

Report:

Your report must include at least the following contents:


 Task 1:
o Screenshots of your University of Hertfordshire ID as your hostname & username
o Screenshots of the hacking evidence
o Discussion of the hacking incident
o Evaluation of Linux security
 Task 2:
o Screenshots of socket programming result after execution
o Screenshots of traffic capture
o Explanation and illustration of the communication process

____________________________________________________________________________

Submission Requirements:
Please submit the following components via Canvas/5WCM0011/Assignment/Coursework 2:

 One zipped file containing:


o Wireshark traffic trace for task 1 and task 2
o Original socket program for task 2
 Report
_________________________________________________________________________________

Submission Requirements:

Please submit the report via Canvas/5WCM0011/Assignment/Coursework 1.

This assignment is worth 40% of the overall assessment for this module.

Marks awarded for:

Components Marks
Network Security 45%
Socket Programming 45%
Quality of Report 10%
Total 100%

 Task 1: the practical work; the discussion of the event; and the evaluation of Linux security
 Task 2: the practical work (including both socket programming and traffic capture); and the
explanation of the communication process
 Quality of Report: academic writing; presentation of the written work

A note to the students:

1. For undergraduate modules, a score above 40% represent a pass performance at honours level.
Page 3 of 5
UNIVERSITYOF HERTFORDSHIRE
School of Engineering and Computer Science
2. For postgraduate modules, a score of 50% or above represents a pass mark.
3. Modules may have several components of assessment and may require a pass in all elements.
For further details, please consult the relevant Module Guide or ask the Module Leader.

Typical (hours) required by the student(s) to complete the assignment: 50 hours

Date Work handed out: Date Work to be handed in: Date Work to be returned:
rd
3 October 2022 15 November 2022 (18:00) 25 November 2022

Type of Feedback to be given for this assignment:


In-course formative feedback and individual personalised summative feedback for each student as well
as marks awarded based on the criteria set in the next section.

*Please note that Canvas will cap the mark automatically when the submission is late, even if it is only
late by 1 minute. Therefore, please do NOT leave your submission until the last minute just in case there
are some technical issues.

Grading Criteria
  Network Security (45%) Socket Programming (45%) Quality of Report (10%)

Flawless execution of the Flawless execution of the Excellent writing skills. Zero or
practical work. Results clearly practical work. Results very little typo. Decent
presented with proper clearly presented with proper academic language used. Nice
annotation and descriptions. annotation and descriptions. and neat format presented. Well
1:1 Distinguished anatomy of the Productive and accurate structured. References used
incident. Critical evaluation of explanation. properly.
the OS, covering all
aspects as required.

Successful conduct of the Successful conduct of the Good writing skills. Some minor
practical work. Results practical work. Results adjustments needed for the
presented well. Good presented well. The language and structure.
discussion of the incident. explanation is mostly well Formatting ok. Some typos.
2:1 Evaluation is well made, but not given, but still needs some Healthy amount of references,
in-depth enough. Some tweaking. but maybe not quoted properly.
improvements are needed here
and there.

2:2 Practical work mostly Practical work mostly Relatively good attempt on the
successful. Good attempt on successful. Good attempt on writing, but not quite
the discussion and evaluation. the explanation, perhaps presentable. Academic
Perhaps missing some valuable missing some valuable language needs improving.
points. Can benefit from major points. Can benefit from Reasonable structure.
improvements. major improvements. Maybe weak style and
formatting. Proofreading still
would help. Some reference
found.

Page 4 of 5
UNIVERSITYOF HERTFORDSHIRE
School of Engineering and Computer Science
Good attempt on the practical Good attempt on the Some effort in writing. Maybe
work, although with some practical work, although with too verbose. Poor academic
errors. Doubtable results. some errors. Doubtable language. Too many typos.
Discussion and evaluation results. Some explanations, Poorly structured. Lack of
3rd
exist, but lack of but incomplete. formatting. Little or no
solid statements. references.

Failed attempt on the practical Failed attempt on the Totally unpresentable.


work. No results or completely practical work. No results or Academic dishonesty.
wrong results. completely wrong results.
Fail Little discussion and evaluation. Little discussion and
Academic dishonesty. evaluation. Academic
dishonesty.

If you can do this assignment, please contact me +923127276714.

Page 5 of 5

You might also like