Submission instruction: Submittwo (2) fileson Moodle only: The report, based on the answer template, called[StudentID]-report.docx. [StudentID]-https.pcap Replace [StudentID] with your actual student...

1 answer below »

Submission instruction:


Submittwo (2) fileson Moodle only:


  1. The report, based on the answer template, called[StudentID]-report.docx.

  2. [StudentID]-https.pcap

Replace [StudentID] with your actual student ID, e.g. so the first file is12345678-https.pcap.(student id: 12079116)please use the attached template that i have atatched herewith. and please the follow the instructions that they have given the pdf.
(message:Coz this is the last assignment for this subject. If I want to pass this subject definitely I have to achieve 30 out of 40. Can you take this responsibility? Money is not a problem. I need the best expert. That's it. Don't think about money. I'm happy to pay. Coz this second assignment very tuff the 1st assignment. Can you take responsibility? I need a 100% good expert.need to do this perfectly. If you can't do this please let me know right now. 30/40 to pass this subject that's why.Otherwise, I'll fail. Becoz I most lost marks for this previous order that I have done from yu so I need to achieve 30/40 for my this order. If you agree I'll hand it over to you. But I need half money-back guarantee. Or something like that.ultimately don't say sorry.I need to pass this so I need to take 30/40. if you can do it under my requirements I'm happy to pay for a new order, if you can't let me know.)







Assignment 1 Submission COIT20262Assignment 2 SubmissionTerm 1, 21 COIT20262 - Advanced Network Security, Term 1, 2021 Assignment 2 Submission Due date: 11:45 pm Monday 7 June 2021 (Week 13) Weighting: 40% 1 Length: N/A Student Name:enter your name Student ID:id Campus:campus Tutor:tutor HTTPS and Certificates Part (a) Write your answer here Part (b) Write your answer here Part (c) Write your answer here Part (d) Write your answer here Attack Detection from Real Intrusion Dataset Part (a) Write your answer here Part (b) Write your answer here Part (c) Write your answer here Part (d) Write your answer here Firewalls and iptables Part (a) Write your answer here Part (b) Write your answer here Part (c) Write your answer here Part (d) Write your answer here Wireless security Part (a) Write your answer here Part (b) Write your answer here Part (c) Write your answer here Advanced Network SecurityPage 5 of 5 COIT20262 - Advanced Network Security, Term 1, 2021 Assignment 2 Questions Due date: 11:45 pm Monday 7 June 2021 (Week 13) ASSESSMENT Weighting: 40% 2 Length: N/A Instructions Attempt all questions. This is an individual assignment, and it is expected students answer the questions themselves. Discussion of approaches to solving questions is allowed (and encouraged), however each student should develop and write-up their own answers. See CQUniversity resources on Referencing and Plagiarism. Guidelines for this assignment include:  Do not exchange files (reports, captures, diagrams) with other students.  Complete tasks with virtnet yourself – do not use results from another student.  Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks) or from other students.  Write your own explanations. In some cases, students may arrive at the same numerical answer, however their explanation of the answer should always be their own.  Do not copy text from websites or textbooks. During research you should read and understand what others have written, and then write in your own words.  Perform the tasks using the correct values listed in the question and using the correct file names. File Names and Parameters Where you see [StudentID] in the text, replace it with your actual student ID. If your student ID contains a letter (e.g. “s1234567”), make sure the letter is in lowercase. Where you see [FirstName] in the text, replace it with your actual first name. If you do not have a first name, then use your last name. Do NOT include any spaces or other non- alphabetical characters (e.g. “-“). Submission Submit two files on Moodle only: 1. The report, based on the answer template, called [StudentID]-report.docx. 2. Submit the packet capture [StudentID]-https.pcap on Moodle Marking Scheme A separate spreadsheet lists the detailed marking criteria. Virtnet Questions 1 and 3 require you to use virtnet topology 5. The questions are related, so you must use the same nodes for all three questions.  node1: client; assumed to be external from the perspective of the firewall. https://www.cqu.edu.au/student-life/services-and-facilities/referencing  node2: router; gateway between the internal network and external network. Also runs the firewall.  node3: server; assumed to be internal from the perspective of the firewall. Runs a web server with HTTPS and a SSH server for external users (e.g. on node1) to login to. Will contain accounts for multiple users. Question 1. HTTPS and Certificates [10] For this question you must use virtnet (as used in the Tutorials) to study HTTPS and certificates. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and testing the website. Your task is to setup a web server that supports HTTPS. The tasks and sub-questions are grouped into multiple phases. Phase 1: Setup Topology 1. Create topology 5 in virtnet. 2. Deploy the MyUni demo website, with node3 being the real web server. Phase 2: Certificate Creation 1. Generate your own RSA 2048-bit key pair. Use the public exponent of 65537. Save your key pair as [studentID]-keypair.pem. Use your RSA key pair to generate a Certificate Signing Request called [StudentID]-csr.pem. The CSR must contain these field values:  State: state of your campus  Locality: city of your campus  Organisation Name: your full name  Common Name: www.myuni.edu  Email address: your @cqumail address  Other field values must be selected appropriately. Now you will change role to be a CA. A different public/private key pair has been created for your CA as [StudentID]-ca-keypair.pem. As the CA you must: 2. Setup the files/directories for a demoCA 3. Create a self-signed certificate for the CA called [StudentID]-ca-cert.pem. 4. Using the CSR from step 1 issue a certificate for www.myuni.edu called [StudentID]- cert.pem. Phase 3: HTTPS Configuration 1. Configure Apache web server on node3 to use HTTPS where the domain name is www.myuni.edu 2. Load the CA certificate into the client on node1. Phase 4: Testing 1. Start capturing on node2 using tcpdump. http://www.myuni.edu/ http://www.myuni.edu/ http://www.myuni.edu/ 2. On node1, use lynx to visit https://www.myuni.edu/grades/ and login to view some grades. 3. Demonstrate to your tutor that your secure website is operating correctly. [4 marks] 3. Exit lynx. 4. Stop the capturing and save the file as [StudentID]-https.pcap. When capturing, make sure you capture a full HTTPS session, and avoiding capturing multiple sessions. For on-campus students: Step 3 of above should be demonstrated in your allocated Week 9, 10, 11 or Week 12 tutorial class. Your local tutor will be informed you when your demonstration is passed. For distance students: Unit Coordinator will organise a time for you to demonstrate step 3. Phase 5: Analysis (a) Demonstration of secure web site [4 marks] (b) Submit the following packet capture [StudentID]-https.pcap on Moodle [1 marks] (c) Draw a message sequence diagram that illustrates the TLS/SSL packets belonging to the first HTTPS session in the file. Refer to the instructions in assignment 1 for drawing a message sequence diagram, as well as these additional requirements:  Only draw the TLS/SSL packets; do not draw the 3-way handshake, TCP ACKs or connection close. Hint: identify which packets belong to the first TCP connection and then filter with “ssl” in Wireshark. Depending on your Wireshark version, the protocol may show as “TLSv1.2”.   A single TCP packet may contain one or more SSL messages (in Wireshark look inside the packet for each “Record Layer” entry to find the SSL message names). Make sure you draw each SSL message. If a TCP packet contains multiple SSL messages, then draw multiple arrows, one for each SSL message, and clearly label each with SSL message name.   Clearly mark which packets/messages are encrypted. [3 marks]  (d) Generally, Certificate Authorities must keep their private keys very secure by storing them offline in special hardware devices. Explain an attack a malicious user could be perform if they could compromise the CA private key. Use your MyUni website as an example. [2 mark]   https://www.myuni.edu/grades/ Page 5 of 8 Question 2. Attack Detection from Real Intrusion Dataset [10 marks] This task is the continuation of the question 2 Assignment 1 where you have evaluated the UNSW-NB15 dataset with three different classifiers where you did not apply any feature selection techniques. Feature selection is one of the key principles that greatly impacts the model’s efficacy by selecting only those features that are most relevant and thereby, reduces over-fitting, improves accuracy and reduces training time. Here you need to explore different built-in feature selection techniques (at least three) in WEKA and identify the best features for each classifier. For this task you will need two files available on Moodle:  train.arff and test.arff. You need to follow the following steps:  Step 1: Import data in the train.arff into WEKA (explorer).  Step 2: Select the attributes by using Attribute evaluator (at least 3) and search method in WEKA and update your datasets accordingly.  Step 2: Choose a classifier (That you already used in Question 2 Assignment 1).  Step 3: Specify the test option as Use training set and the column of class.  Step 4: After the training, supply the test dataset (test.arff) to evaluate the classifier.  Step 5: Re-evaluate model on current test set to perform the evaluation.  Repeat the step 2 to 7 for other two classifiers. You need to include in your report the following: (a) Screenshot of the selected attributes and evaluation result for each classifier. (1.5 marks) (b) Compare your current outcomes with the outcomes of Question 2 Assignment 1 in term of Accuracy, precision, recall, F1-Score and false positive rate. (3 marks) Reflections: (c) Have you achieved better performance after applying the feature selection technique for each classifier? If yes, why you have achieved that. If no, what is reason you think for that. (2.5 marks) (d) In the UNSW-NB15 dataset, there are nine types of network attacks available. Among these nine attacks which three attacks are highly detected by the classifiers? Please give a short explanation of these three attacks. [3 marks] Page 6 of 8 Question 3. Firewalls and iptables [10] You are tasked with designing a network upgrade for an educational institute which has a single router, referred to as the gateway router, connecting its internal network to the Internet. The institute has the public address range 120.50.0.0/17 and the gateway router has address 120.50.170.1 on its external interface (referred to as interface ifext). The internal network consists of four subnets: A DMZ, which is attached to interface ifdmz of the gateway router and uses address range 120.50.171.0/25.  A small network, referred to as shared, with interface ifint of the gateway router connected to three other routers, referred to as staff_router, student_router, and research_router. This network has no
Answered 9 days AfterMay 25, 2021COIT20262Central Queensland University

Answer To: Submission instruction: Submittwo (2) fileson Moodle only: The report, based on the answer template,...

Kshitij answered on Jun 03 2021
146 Votes
Assignment 1 Submission
COIT20262    Assignment 2 Submission    Term 1, 21
COIT20262 - Advanced Network Security, Term 1, 2021
Assignment 2 Submission
    Due date:
    11:45 pm Monday 7 June 2021 (Week 13)
    
    Weighting:
    40%
    1
    Length:
    N/A
    
Student Name:        enter your name
Student ID:        id    
Campus:        campus
Tutor:            tutor
HTTPS and Certificates
Part (a)
Write your answer here
Part (b)
Part (c)
Write your answer here
Part (d)
Write your answer here
Attack Detection from Real Intrusion Dataset
Part (a)
Write your answer here
Part (b)
Write your answer here
Part (c)
Write your answer here
Part (d)
Write your answer here
Firewalls and iptables
Part (a)
Write your answer here
Part (b)
Write your answer here
Part (c)
Write your answer here
Part (d)
Write your answer here
Wireless security
Part (a)
Write your answer here
Part (b)
Write your
answer here
Part (c)
Write your answer here
Advanced Network Security        Page 5 of 5
StudentID]-csr.pem.txt
kali@LAPTOP-GQ9FBKMI:~$ openssl genrsa -out private.pem
Generating RSA private key, 2048 bit long modulus (2 primes)
.......................+++++
......+++++
e is 65537 (0x010001)
kali@LAPTOP-GQ9FBKMI:~$ openssl genrsa -out private.pem 65537
Warning: It is not recommended to use more than 16384 bit for RSA keys.
Your key size is 65537! Larger key size may behave not as expected.
Generating RSA private key, 65537 bit long modulus (2 primes)
.................^C
kali@LAPTOP-GQ9FBKMI:~$ openssl genrsa -out private.pem 4096
Generating RSA private key, 4096 bit long modulus (2 primes)
.......++++
......................................................................................++++
e is 65537 (0x010001)
kali@LAPTOP-GQ9FBKMI:~$ openssl genrsa -out 12079116-keypair.pem 4096
Generating RSA private key, 4096 bit long modulus (2 primes)
........++++
....................................................................++++
e is 65537 (0x010001)
kali@LAPTOP-GQ9FBKMI:~$ cat 12079116-keypair.pem
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
kali@LAPTOP-GQ9FBKMI:~$ openssl rsa -pubout -in 12079116-keypair.pem -out public.pem
writing RSA key
kali@LAPTOP-GQ9FBKMI:~$ cat pub
pubilc.pem public.pem
kali@LAPTOP-GQ9FBKMI:~$ cat pub
pubilc.pem public.pem
kali@LAPTOP-GQ9FBKMI:~$ cat public.pem
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
kali@LAPTOP-GQ9FBKMI:~$ openssl rsa -text -in 12079116-keypair.pem
RSA Private-Key: (4096 bit, 2 primes)
modulus:
00:cf:f2:0e:cf:b5:73:20:b4:6e:3b:ba:82:73:83:
7e:23:57:eb:74:18:1c:1e:85:ed:3f:68:b1:a9:e4:
eb:69:51:1a:78:b0:f3:c1:56:92:a0:51:77:38:db:
81:14:b8:79:58:3a:07:28:59:05:5e:7c:ba:b2:5a:
de:3e:5c:29:26:56:ab:44:92:0f:31:5b:fa:61:ac:
01:9f:db:d8:25:30:dd:87:11:6d:50:06:7a:24:8c:
26:fd:4d:26:16:1f:54:09:62:7f:a3:01:4f:9d:9d:
a0:95:9b:18:42:20:4f:34:ce:35:72:7d:77:8d:7a:
2d:96:e1:6c:34:60:f6:e5:7e:f1:6e:78:5f:a6:f3:
85:79:b8:79:6d:76:8b:66:d4:80:b8:2e:64:de:1e:
ba:d7:3e:83:42:c5:3d:d0:5c:33:13:66:ee:3b:75:
09:8c:35:22:fc:5b:f3:e6:b2:6c:85:76:9e:80:a7:
9f:a9:ee:5a:fc:aa:69:ef:4a:f0:48:bc:98:2e:d4:
2c:4c:62:b0:41:1a:92:e2:b2:52:01:17:9e:8a:be:
4e:21:cb:94:3d:d1:7c:cd:aa:80:54:58:1b:f1:e5:
3d:ff:5f:eb:a1:1d:7b:88:69:a7:00:3a:c4:59:03:
d5:a0:81:5f:dc:71:84:65:19:79:99:ea:49:cc:f3:
36:9d:a1:60:f7:29:f9:c6:d2:80:63:35:7f:8a:4f:
f0:e4:2e:38:5f:cf:d9:46:41:c3:09:d7:71:89:2a:
24:35:ef:99:29:0d:a3:90:8b:f3:c6:95:14:16:8c:
dd:c3:11:91:c1:19:ff:c0:80:a6:ec:b3:e3:a1:97:
ff:3b:f5:16:09:3c:55:82:41:bb:0c:56:cf:89:61:
ca:b8:f6:c7:9e:47:4f:df:6e:ac:83:e3:45:f7:c5:
31:3d:50:a7:7c:dc:b2:d7:25:01:1f:61:41:bd:cb:
60:92:02:e7:2b:12:d3:d7:a1:ca:cf:d1:be:9b:db:
9f:01:ad:90:3c:f7:12:88:fa:bd:05:a9:ea:3c:bc:
53:88:8c:14:65:09:af:0e:44:a6:f2:4d:6f:29:5d:
4c:42:ef:fc:da:60:b4:a9:e6:2e:a0:ae:ba:6b:cc:
77:fe:5b:8c:1a:43:6a:98:a6:6e:2b:56:0e:e7:ae:
fd:46:5a:8a:d2:7c:9a:14:b0:1d:35:50:49:25:d9:
a3:c5:fe:00:c0:37:93:63:a1:82:08:00:de:a5:36:
75:cc:4a:ea:17:02:83:56:5e:03:2d:a7:e8:c2:1b:
b8:cb:b4:e3:85:18:a3:2f:62:5c:94:4b:fe:97:c2:
f2:a3:d0:6c:d9:c7:f9:b5:8b:35:13:ab:68:49:29:
3b:a6:31
publicExponent: 65537 (0x10001)
privateExponent:
42:22:3e:b9:aa:80:99:f7:28:53:d0:a6:6a:6c:78:
72:6f:24:d0:00:56:f9:12:28:f9:10:a7:e8:5b:88:
cf:2e:df:17:61:57:b4:b6:7e:dd:83:eb:41:e6:f5:
af:8c:57:f3:4a:49:3a:78:cd:6f:56:85:dd:f1:6e:
5b:30:de:59:76:18:f4:2e:eb:ac:0c:0f:9e:7e:a0:
e9:a1:76:a5:a5:5b:de:f8:18:e6:e9:98:71:05:2d:
e5:43:63:08:88:20:26:f7:ef:95:fc:f5:c0:30:00:
81:74:19:0b:f6:d0:99:ff:b7:19:d9:73:6b:48:5f:
35:6c:2e:08:9e:8a:07:45:0f:2d:ce:14:c5:b9:0f:
4b:3d:f3:48:6f:fa:37:d2:ff:b9:13:f0:3a:80:55:
...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here