Analyzing a suspicious signature IDS, computer science homework help

User Generated

VGjnaanor

Computer Science

Description

  1. Refer to Figure 10-13 on page 405 of your text (Hand-On Project 10-2)
  2. Identify the possible intruder. How could you trace the intruder and determine whether this person has been responsible for any other attacks.
  3. Where is the source IP computer located? Is the computer known to have been involved in any other attacks? Explain.
  4. Describe what kind of event is happening in Figure 10-13.
  5. Suggest how you could prevent similar intrusion attempts from succeeding in the future

Unformatted Attachment Preview

create cusion 1. Review the data in Figure 10-13. III particuldi, IIbte the and ports. -0% Cids, log - Notepad File Edit Format View Help ID Date Time Src IP 189045 Dec 21 10:12:24 68.160.241.137 55320 Src Port Dest IP Dest Port Protocol 192.168.20.1 1433 TCP 189046 Dec 21 10:12:24 68.160.241.137 55321 192.168.20.2 1433 TCP 189047 Dec 21 10:12:24 68.160.241.137 55298 192.168.20.3 1433 TCP 189048 Dec 21 10:12:24 68.160.241.137 55270 192.168.20.4 1433 TCP 189049 Dec 21 10:12:24 68.160.241.137 55274 192.168.20.5 1433 TCP 189050 Dec 21 10:12:24 68.160.241.137 55169 192.168.20.6 1433 TCP 189051 Dec 21 10:12:24 68.160.241.137 55067 192.168.20.7 1433 TCP 189052 Dec 21 10:12:24 68.160.241.137 55065 192.168.20.8 1433 TCP 189053 Dec 21 10:12:25 68.160.241.137 55126 192.168.20.9 1433 TCP 189054 Dec 21 10:12:25 68.160.241.137 55324 192.168.20.10 1433 TCP 189055 Dec 21 10:12:25 68.160.241.137 55208 192.168.20.11 1433 TCP 189056 Dec 21 10:12:25 68.160.241.137 55154 192.168.20.12 1433 TCP 189057 Dec 21 10:12:25 68.160.241.137 55189 192.168.20.13 1433 TCP 189058 Dec 21 10:12:25 68.160.241.137 55046 192.168.20.14 1433 TCP 189059 Dec 21 10:12:25 68.160.241.137 55077 192.168.20.15 1433 TCP Figure 10-13 Destination IP addresses and ports 2. Identify the possible
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

thank you,I will work on this right away
Attached.

Running Head: IDS

1

IDS

Institutional Affiliation

Date

IDS
Identify the possible intruder. How could you trace the intruder and determine whether
this person has been responsible for any other attacks.

In this case, the intruder is trying t...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags