Identify tools/software that can monitor Network Traffic, which helps detect cyber threats

User Generated

Nqrywhzznu

Writing

Description

Project Deliverables

  • Projects reports are expected to be 5 pages long. Don't stretch the report just to meet a particular page number, nor feel constrained if it needs to be longer to get your key points and results across.
  • A good report must answer the standard questions about any research project. The following format is suggested and including the information I asked above:
    • Abstract: WHAT did you do, WHY was it important, WHAT were your high level results?
    • Problem Statement: WHAT is the problem you attempted to solve?
    • Prior Work: HOW have others approached your problem?
    • Research Approach: WHAT was your approach to solving your problem? WHAT did you build? WHAT was your experimental methodology in terms of instrumentation, data collection, analysis, etc.? Include figures to describe your architecture and to assist in the presentation of your algorithms and analyses.
    • Results: WHAT were your results? HOW did you evaluate your work and WHAT were your figures of merit? Include graphs, charts, or other ways to visually describe your results.
    • Lessons Learned and Future Work: If you knew then what you know now, WHAT would you do differently? WHAT questions are left for future research?
    • Summary and Conclusions: Summarize your project and place your results in an overall context.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello there!😃 kindly find attached and in case you need anything please let me know.🙏

Surname1
Student Name:
Institution:
Class:
Date:

Abstract
It is indeed important to note that billions of people use the most complex and largest
information network called the Internet. Despite the fact that this internet is able to provide many
communication services to its users, many challenges have been experienced as far as the privacy
and security is concerned and thereby leading to the execution of cyber-attacks. To be able to curb
these menace, the security operators have basically devised diverse security techniques and tools
such that the cyberspace is able to be monitored. It is important to also note that the most crucial
way to be able to infer and monitor the online threat activities is by basically collecting the
information from what is best known as trap-based monitors.
This paper is going to primarily look at the tools that can be used in the process of
monitoring the cyberspace and the most important one that will be fundamentally talked about is
the Trap-based monitoring sensor. Additionally, it is going to present some approaches which
ideally correspond to the cyber monitoring systems like Nicter. In this particular context, legal
issues and security policies are going to be presented as far as network monitoring is concerned.
In simple terms, this project is going to provide an overview especially on the internet space and

Surname2
help all the readers to be able to understand the concept fully especially that of detecting, analyzing
and observing cyber-attacks through what is best known as network traps.
The problem statement
In the current society, on the information network, there are many security issues which
have led to cyber-attacks. Special tools have been set aside to ensure that this menace of security
lapses in the network space has been taken care of.
Prior Work
Cyber-attack has been a serious issue for many years now and many people have always
been looking for ways to ensure that this issue is done with as soon as possible. Through the
network, people have lost their data to unwanted people who use them for their personal gains. As
matter of fact, people have worked around the clock in the process of looking for the tools that can
be able to prevent this and many tools have been devised which would help reduce and monitor
cyber-attacks.
Research approach
It is important to note that currently the network of networks which is the internet, ideally
provides the sharing of information and communication systems to approximately more than seven
billion people. This number is, however, increasing dramatically has people keep becoming more
depended on mobile, social media, gaming, telecommunication, dating sites. This essentially
increases the sharing of information and that is the precise reason as to why it was referred to as
"Big Data". This term has actually become a serious challenge and a shock for the I...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags