欧美一级a免费放视频,欧美一级a免费放视频_丰满年轻岳欲乱中文字幕电影_欧美成人性一区二区三区_av不卡网站,99久久精品产品给合免费视频,色综合黑人无码另类字幕,特级免费黄片,看黃色录像片,色色资源站无码AV网址,暖暖 免费 日本 在线播放,欧美com

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

7CCSMNSE代做、代寫C++,,Python程序語言
7CCSMNSE代做、代寫C++,Python程序語言

時間:2025-03-27  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



Page 1 of 6
6CCS3NSE/7CCSMNSE
Network Security
6CCS3NSE/7CCSMNSE Network Security 
2023-24 Academic Year
Coursework Specification
Module title: Network security
Module code: 6CCS3NSE/7CCSMNSE
Coursework title: Network attack and defence
Individual or group: This coursework can be done in a group or individually. The group 
size depends on the experimental needs and is capped at a maximum 
of 4. If working in a group, all group members are awarded the same 
mark that is awarded to the submitted coursework. 
Once you have formed a group offline, everyone must use the link 
register your group. If you are doing the coursework individually then 
you should register a group too, but your group will have just 1 
member. 
Weight of the overall assessment 
for this module
15%
Learning outcomes assessed in 
this coursework
• Demonstrate knowledge of security properties for networks and 
the principal approaches to guaranteeing those properties
• Demonstrate an understanding of network attacks
• Demonstrate an understanding of network defence
Data work handed out: 9
th February 2024
Data work to be handed in: 24
th April 2024
Target date for the return of the 
marked assignment:
within 4 weeks of handed in
Submission requirements: Each submission (individually or in a group) should contain a report 
of maximally 1500 words or a video of maximum 15 minutes long. If 
working in a group, 1 submission only is required per group.
Page 2 of 6
The goal of this coursework is to apply the knowledge and the understanding from the classroom in a real 
network scenario. The overall task is to create a network, run and observe normal traffic, then launch 
network attacks, and observe the impact on network performance. Finally use network defence 
mechanisms to protect the network and observe the effectiveness. It contains several levels of tasks, and a 
total mark of 100.
Level 1: Build a network and test its connectivity (20 marks)
At this level, you are supposed to build a network using the module VMs or mininet. 
• Draw a diagram to show the topology of your network. Each computer on the diagram should have 
its IP address labelled. 
• Test connectivity of the network by using the ping command. 
o If work in a group using VM, full connectivity between any two machines should be tested.
You should also test the connectivity to the Internet on VM. 
o If you use mininet, also show the connectivity between each host in your network. Hosts in 
mininet can also be connected to the Internet but it requires extra configuration so is not 
compulsory at this level. 
Level 2: Generate and analyse traffic on your network (20 marks)
At this level, you are supposed to generate some network traffic on your network, observe the traffic in 
network sniffer(s) and measure network performance. This step is important as it builds the benchmark for 
you to compare with later levels.
• Generate traffic.
o It is your choice of what kind of traffic you want to generate via standard Internet 
applications or a tool you research and find to generate Internet traffic. 
o You may use Internet applications to generate traffic. For example, you can open a web 
browser on your VM. 
o You may use the tool iperf to generate traffic such as UDP and TCP on your network. This 
makes the volume of the traffic easily controllable. Iperf can be used on VM and mininet. 
• Traffic analysis
o Use tcpdump or wireshark to monitor the traffic.
o Analyse the traffic at protocol level, packet level and flow level using wireshark
• Network performance analysis
o Analyse the performance of the TCP/UDP traffic such as throughput, delay and packet loss. 
You can get the performance data from iperf output or wireshark statistics. 
Level 3: Network attack(s) (25 marks)
At this level, let’s see how network attacks impact the network. 
• Generate normal traffic as you have done at level 2
• Generate an attack or multiple attacks such as ICMP flooding, TCP SYN flooding, IP spoofing or any 
other, when the normal traffic is ongoing
o Remember you can use multiple machines/VMs or multiple hosts in mininet 
o You can use hping3 or any other tools
Page 3 of 6
• Analyse how network attacks impact the network, via traffic analysis and network performance 
analysis by comparing the results with that at level 2. 
Level 4: Network defence (25 marks)
At this level, let’s see how firewall(s) in your network can defend the victim from the attacks. 
• Set a firewall on your network and configure its rules. You can use iptables on the VMs or in 
mininet. You can also choose to use other firewalls. Multiple rules can be used for the defence.
• Generate the normal traffic as you have done at level 2.
• Generate the attacks as you have done at level 3. 
• Show how the firewall works to mitigate the attacks.
• Compare and analyse the performance of level 2, 3, and 4 to demonstrate the effectiveness of the 
firewall.
Level 5: Critical evaluation and reflection (10 marks)
Critically evaluate what you have learnt from this coursework technically and socially. If you are in a group, 
each of you must tell your role in the experiment (attacker/victim) and what you have contributed to the 
design, development and running of the experiment. 
Submission
A report of maximum 1500 word that describes your experiments from level 1 to level 4 and analysis and
includes the critical evaluation and reflection at level 5. The report should be a PDF file. 
The report should be named as “24nse.gxxx.pdf”, where xxx is your group number. For example, if your 
group number is 2, the filename should be “24nse.g001.pdf”.
Or 
A video of maximum 15 minutes that demonstrates the experiments from level 1 to level 4 and analysis, 
and your verbal reflection at level 6. Each group member must say their reflection in the video. The video 
should be an mp4 file. 
The mp4 should be named as “24nse.gxxx.mp4”, where xxx is your group number. For example, if your 
group number is 2, the filename should be “24nse.g001.mp4”.
Marking
Marking is based on the marking scheme above from evidence in the submitted report or video. See 
marking rubrics next page. 
Page 4 of 6
Marking Rubrics
Level 1: Build a network and test its connectivity (20 marks)
Rubrics Marks
Excellent description or demonstration of a network built in VM or mininet. 
Network topology clearly drawn in report or shown in video with IP addresses of 
nodes marked correctly. Connectivity fully tested and shown in report by 
screenshots or in video by demonstration. 
15-20
A network built in VM or mininet. Network topology clearly drawn in report or 
shown in video with IP addresses of nodes marked correctly. Connectivity fully 
tested and shown in report by screenshots or in video by demonstration. 
There could be minor slips in description or demonstration. 
10-14
A network built in VM or mininet. Network topology drawn in report or shown in 
video with IP addresses of nodes marked. Some connectivity tested and shown
in report by screenshots or in video by demonstration. 
Errors are found in the drawing/testing. 
Not all necessary screenshots are provided in report or demonstrations not 
shown in video. 
5-9
Some attempt of building the network. 1-4
No network is built. 0
Level 2: Generate and analyse traffic on your network (20 marks)
Rubrics Marks
Excellent description or demonstration of sensible traffic generated on the 
network built at level 1, using iperf or other tools of choice. Excellent traffic 
analysis and network performance analysis.
Screenshots of traffic generation and traffic analysis are included in report or 
demonstrated in video submission. 
15-20
Good description or demonstration of sensible traffic generated on the network 
built at level 1, using iperf or other tools of choice. Good traffic analysis traffic 
analysis and network performance analysis.
Screenshots of traffic generation and traffic analysis are included in report or 
demonstrated in video submission. 
10-14
Some traffic generated on the network built at level 1, using iperf or other tools 
of choice. Some traffic analysis and network performance analysis but may 
contain some errors.
5-9
Page 5 of 6
Limited screenshots of traffic generation and traffic analysis are included in 
report or demonstrated in video submission. 
Some attempt of generating the traffic and analysis. 1-4
No attempt of generating traffic. 0
Level 3: Network attack(s) (25 marks)
Rubrics Marks
Excellent description or demonstration of multiple network attacks executed in 
the network. Excellent analysis on how network attacks impact the network via 
traffic analysis and network performance analysis compared with level 2. 
Screenshots of network attacks and analysis are included in report or 
demonstrated in video submission.
18-25
Good description or demonstration of one or multiple network attacks executed 
in the network. Good analysis on how network attacks impact the network via 
traffic analysis and network performance analysis compared with level 2. 
Screenshots of network attacks and analysis are included in report or 
demonstrated in video submission.
12-17
Some attack(s) generated on the network but may not be completed. Some 
analysis on how network attacks impact the network via traffic analysis and 
network performance analysis but not well explained. 
Limited screenshots of network attacks and analysis are included in report or 
demonstrated in video submission.
6-11
Some attempt of generating attacks. 1-5
No attempt of generating attacks. 0
Level 4: Network defence (25 marks)
Rubrics Marks
Effective firewall rule setup to block the attack. Excellent description or 
demonstration on how the firewall defends the network. Excellent traffic 
analysis and performance evaluation through comparison of level 2, 3 and 
4. 
Screenshots of firewall setup and experiments are included in report or 
demonstrated in video submission.
18-25
Good firewall rule setup to block the attack. Good description or 
demonstration on how the firewall defends the network. Good traffic 
12-17
Page 6 of 6
analysis and performance evaluation through comparison of level 2, 3 and 
4.
Screenshots of firewall setup and experiments are included in report or 
demonstrated in video submission.
Some firewall setup to block the attack but may not be effective. Some 
description or demonstration on how the firewall defends the network. 
There may be errors in traffic analysis and performance evaluation 
through comparison of level 2, 3 and 4.
Limited screenshots of firewall setup and experiments are included in report or 
demonstrated in video submission.
6-11
Some attempt of defending the network 1-5
No attempt of defending the network 0
Level 5: Critical evaluation and reflection (10 marks)
Rubrics Marks
Critical evaluation and reflection both technical and social aspects. 6-10
Some evaluation and reflection but may not be critical. 1-5
No attempt 0

請加QQ:99515681  郵箱:[email protected]   WX:codinghelp




 

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:隨手用全國客服電話-隨手用24小時人工服務(wù)熱線
  • 下一篇:代寫CDS526、代做c/c++,,Python程序設(shè)計
  • ·MISCADA代做、代寫Python程序語言
  • ·代寫CSE 231,、代做Python程序語言
  • ·CIV6782代做,、代寫Python程序語言
  • ·CS305程序代做、代寫Python程序語言
  • ·代寫FN6806、代做c/c++,,Python程序語言
  • ·代寫CS-UY 4563、Python程序語言代做
  • · COMP338編程代做,、代寫Python程序語言
  • ·CDS523編程代寫,、代做Python程序語言
  • ·COMP0035代做,、代寫python程序語言
  • ·代寫2530FNW,、代做Python程序語言
  • 合肥生活資訊

    合肥圖文信息
    出評 開團(tuán)工具
    出評 開團(tuán)工具
    挖掘機(jī)濾芯提升發(fā)動機(jī)性能
    挖掘機(jī)濾芯提升發(fā)動機(jī)性能
    戴納斯帝壁掛爐全國售后服務(wù)電話24小時官網(wǎng)400(全國服務(wù)熱線)
    戴納斯帝壁掛爐全國售后服務(wù)電話24小時官網(wǎng)
    菲斯曼壁掛爐全國統(tǒng)一400售后維修服務(wù)電話24小時服務(wù)熱線
    菲斯曼壁掛爐全國統(tǒng)一400售后維修服務(wù)電話2
    美的熱水器售后服務(wù)技術(shù)咨詢電話全國24小時客服熱線
    美的熱水器售后服務(wù)技術(shù)咨詢電話全國24小時
    海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機(jī)場巴士4號線
    合肥機(jī)場巴士4號線
    合肥機(jī)場巴士3號線
    合肥機(jī)場巴士3號線
  • 上海廠房出租 短信驗(yàn)證碼 酒店vi設(shè)計