ITSU3008 Project 1 Assignment 2 System Requirements Report ITSU3008 Assignment 2 Copyright © XXXXXXXXXXVIT, All Rights Reserved. 2 Objective(s) This assessment item relates to the unit learning...

1 answer below »
I just want the methodology for part fpr my assignment, The topic of assignment is Ip spoofing and its solution.Here we are creating a project for ip spoofing prevention, and i just want the methodology for it, it could be any agile, waterfall, or any whichever is suitable, along with how i am going to go on through the project, include ingress filtering on it as well


ITSU3008 Project 1 Assignment 2 System Requirements Report ITSU3008 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 2 Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student Planning skills and to give students experience in researching a topic and creating a plan for the project. INSTRUCTIONS These instructions apply to Assignment 2 – System Requirements Report Assignment 2 - System Requirements Report (20% - Group 4%, Individual 16%) Due Week 5 For this component you will be required to address the System Requirements of your project. This Assignment will focus on the hardware and software requirements, functional and non- functional requirements. The assignment will also focus on the methodology to be used for the project. The report must follow the template provided on the LMS. Citation of sources is mandatory and must be in the IEEE style. The IEEE SRS template is available in the supplementary material section on the Moodle, the document will assist you in creating the assignment. What to Submit. Submit your report to the Moodle drop-box for Assignment 2. Note that this will be a turn-it-in drop box and as such you will be provided with a similarity score. This will be taken into account when grading the assignment. Note that incidents of plagiarism will be penalized. If your similarity score is high you can re-submit your report, but re-submissions are only allowed up to the due date. If you submit your assignment after the due date and time re-submissions will not be allowed. Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 10% per day including weekends. ITSU3008 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 3 Marking Guide: 70 Marks Task Description Marks Report Layout The report style, language and structure should be appropriate. 5 Hardware Requirements The section should include the hardware requirements of the Project. 10 Software Requirements The section should include the software requirements of the Project. 10 Functional Requirements The section should include the functional requirements of the Project. 10 Non-Functional Requirements The section should include the non-functional requirements of the Project. 10 Methodology The group should present the methodology they would adopt for the successful completion of the project. 20 References Follow the IEEE style 5 ITSU3008 Project 1 IP Spoofing and Its Solutions Roshan Thapa Bijay Gautam 43677 Ikram mehdi syed 43107 Aqeel abbas 41458 Samir Thapa Contents Executive summary2 Introduction2 Gantt chart3 Budgeting3 Hardware requirement3 Software requirement4 Functional requirement5 Non - Functional requirement6 Methodology6 Conclusion7 References7 Executive summary Herewith, we five members of the group have done a small project on the topic of Ip spoofing and its solutions. We can find how the spoofing affects the whole computer network and how we can resolve it through this project. We have discussed all the needs and requirements for the projects and how much is it going to cost us and the how long the project is going to take time for its completion has been mentioned below. After details study of few papers and research we have come to a conclusion of this project with all the necessity. Introduction Among the various attack methods used by the hackers, IP spoofing is one of the approaches in which the source address will be either hidden or modified such that it will behave as the genuine and incoming from the trusted parties. Due to such, users will trust the incoming request from such location and allow those devices to enter the network and even provide access to use the data contained within that network and the devices connected to that network. This action is carried out by the user for the inappropriate action due to which they will be able to gain the access of information and data within the user’s location. As IP packets are widely used for the managing of the network-based security issues with the tracking of the files and data, so once such IP packets will be tampered it will be possible to make modifications to the existing system. It has been seen that all the IP packets will contain a header with use of those headers it will be possible to provide to manipulate important data of the system. Generally normally received IP packets will be providing the IP address of the incoming devices due to which real owner of the device and their intent will be able to be known in advance, however, with the IP spoofing technique enter devices will make use of the forged IP address and thus actual information of the user and the intent of such user cannot be made. Due to which, there will be higher chances that devices entering in such mode will be able to make manipulation of the internal data of the network and gain unauthorized access to the data within the network and devices connected to such networks (Behal and Arora, 2010). So, network-based hackers and attackers will be able to make maximum benefit from such an approach to enter the network. With a little effort in the improvement of the system and the use of advanced hardware and antivirus, virtual private network, firewalls the security level of the system would be hard to crack. When resources like NIC, Servers, NOC, LOC used by the skilled human resources occurrence IP spoofing is low. In this context, one of the major solutions for protection against IP spoofing could be monitoring of networks for typical activity and deployment of packet filtering for detection of inconsistencies with the use of robust verification methods (Yao et al., 2008). The main purpose of this report is to analyze the concept of IP spoofing and its solution in detail. Further this report provides Gantt chart, high level requirements and budget allocation for the proposed solution. Gantt chart Gantt chart is the figurative representation of the schedule to complete the given project (Geraldi and Lechter, 2012). It is a type of bar diagram. Gantt chart has been used in order to show the timeframe of the given task and time to complete the different stages of the project. Figure 1 Gantt chart showing the timeline for the implementation of secure network connection such that IP spoofing could be protected. Budgeting To prevent IP spoofing to a certain point, we need to have a system that can detect and preventing such possible attacks and for such Implementations of the network with secure protection several hardware and software will be required and the budgeting has been listed below. Components Price (Dollar $) server 100 Transmission media 30 Network interface card 50 Operating system 100 Anti-virus 50 VPN 50/month Firewall 50 Total 430 Hardware requirement As spoofing is not an easy task to perform, it requires a considerable number of resources which isn’t available beforehand (Nikitin, Konushin and Konushin, 2019). Various hardware components will be required for the managing and protection of the IP spoofing and these include: · Servers Servers are the one which send the data to other computers and they need to be sophisticated to prevent it from sending malicious data that could help in attack (Alwahedi et al., 2017). There are several types of servers each of them for their specific purpose. For instance, web servers generally run with Apache server or Microsoft IIS whereas mail servers run with Exim or Email. Both have different purposes where one provides website access and the other helps to send and receive mail. A regular desktop could be turned to a server with appropriate software. Use of the servers will play major role in the network-based communication, due to which lack of effective security protocols will allow the occurrence of the security attack with IP spoofing. · Transmission media The transmission media is a way of transferring the data from server to the computer with various means (Natarajan, 2003). If these media are not secure Man-in-the middle attack could be performed as the attack target the communicating media and pose as the sender/receiver to get the required data. Use of standard media will be effective to protect the spoofing-based attack. · Shared data The shared data is the amount of the data that is shared by the user over the network with certain restrictions. All the features of the data cannot be used by the receiver and only necessary requests and access is provided while sharing the data. Data is the major factor, which is of interest to the attackers during any type of attack, so in case of the attack from IP spoofing it will be major target in the attack. · Network interface card (NIC) Network interface card known as a NIC card is one of the key components to identify the value of a MAC address which is a unique identifier to send and receive the data (Kamble and Mhala, 2012). without NIC card use of the internet is not possible as it holds the value to send and receive the data. A type of NIC card is embedded in the motherboard known as internal NIC card whereas others can be connected externally which is considered as external. Both have the same properties and work. This can be used as the interface for the setting up the attack in any network. Software requirement Besides, the use of the hardware it is possible to prevent the attack in the network from incoming IP spoofing attack with use of the various software and some of the tools that can be used have been discussed in the following section. · Use of the antivirus application. The use of appropriate antivirus would prevent the system from trojan, malware, ransomware, phishing attack and similar other attacks (Brewer, 2016). They help to prevent the impact from any IP spoofing, as harmful file may enter the system. Some of examples includes the use of Bitdefender Antivirus plus, Norton Antivirus plus, Kaspersky etc. · Use of the virtual private networks. Use of virtual private network (VPN) sets up the secure connection with the internet and the user then encrypts all the data during the communication which helps to create the delusion to the attacker if there is any. This disables the possibility of targeting any devices, and hence chances of IP spoofing will be reduced. Some examples include Nord VPN, Express VPN, Cisco AnyConnect etc. · Use of the firewall to protect the network. Security device that helps to filter the unwanted access request by filtering the incoming traffic and securing the system from gaining unauthorized access by the attacker (RajaKumaran and Venkataraman, 2016). Only the trusted devices will be allowed to enter the network, due to which
Answered 2 days AfterApr 24, 2021ITSU3008

Answer To: ITSU3008 Project 1 Assignment 2 System Requirements Report ITSU3008 Assignment 2 Copyright ©...

Neha answered on Apr 26 2021
150 Votes
Agile Methodology
There were times when the waterfall methodology was the most acceptable and adopted methodology by
the organizations to implement a system. It was used as the gold standard for developing the software the software development process needs different types of documentation before implementing the actual code [1]. Generally, the business analyst tries to write the business requirements documents which will be used to capture all the information about the business which are required in the application.
These requirement documents were generally long and used to detail everything like run start visual user interface design and comprehensive functional specifications to overcome for these issues another methodology was implemented, and it is known as the agile methodology full song it can be described as the practice which will promote company site ration of the development and the testing throughout the whole life cycle of software development.
In the agile model it allows the user to have concurrent activities for the development and testing which was not possible with the for-waterfall model. the agile methodology can be used to implement the IP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here