Sign In
Not register? Register Now!
Pages:
7 pages/β‰ˆ1925 words
Sources:
6 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 51.03
Topic:

Malicious Network Activity, Overview of the Network Structure

Research Paper Instructions:

You are a network analyst on the fly-away team for the FBI's cybersecurity sector engagement division. You've been deployed several times to financial institutions to examine their networks after cyberattacks, ranging from intrusions and data exfiltration to distributed denial of services to their network supporting customer transaction websites. A representative from the Financial Services Information Sharing and Analysis Center, FS-ISAC, met with your boss, the chief net defense liaison to the financial services sector, about recent reports of intrusions into the networks of banks and their consortium.
He's provided some of the details of the reports in an email. "Millions of files were compromised, and financial officials want to know who entered the networks and what happened to the information. At the same time, the FS-ISAC has seen extensively distributed denial of service disrupting the bank's networks, impacting the customer websites, and blocking millions of dollars of potential transactions," his email reads.
You realize that the impact from these attacks could cause the downfall of many banks and ultimately create a strain on the US economy. In the email, your chief asks you to travel to one of the banks and using your suite of network monitoring and intrusion detection tools, produce two documents—a report to the FBI and FS-ISAC that contains the information you observed on the network and a joint network defense bulletin to all the banks in the FS-ISAC consortium, recommending prevention methods and remediation against the types of malicious traffic activity that they may face or are facing.
Network traffic analysis and monitoring help to distinguish legitimate traffic from malicious traffic. Network administrators must protect networks from intrusions. This can be done using tools and techniques that use past traffic data to determine what should be allowed and what should be blocked. In the face of constantly evolving threats to networks, network administrators must ensure their intrusion detection and prevention systems are able to analyze, monitor, and even prevent these advanced threats.
Network traffic analysis and monitoring help to distinguish legitimate traffic from malicious traffic. Network administrators must protect networks from intrusions. This can be done using tools and techniques that use past traffic data to determine what should be allowed and what should be blocked. In the face of constantly evolving threats to networks, network administrators must ensure their intrusion detection and prevention systems are able to analyze, monitor, and even prevent these advanced threats.
In this project, you will research network intrusion and prevention systems and understand their use in a network environment. You will also use monitoring and analysis technologies in the Workspace to compile a Malicious Network Activity Report for financial institutions and a Joint Network Defense Bulletin for a financial services consortium.
Create a Network Architecture overview
You travel to the various bank locations and gain access to their networks. However, you must first understand the network architecture of these banks.
Provide a network architecture overview along with diagrams. Your overview can be fictitious or based on an actual organization. The goal is to provide an understanding of network architecture.
a. Describe the various data transmission components:
b. User Datagram Protocol (UDP)
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. Internet packets
e. IP address schemes
f. well-known ports and applications
Address the meaning and relevance of information, such as:
a. The sender or source that transmits a message
b. The encoder used to code messages
c. The medium or channel that carries the messaged. The decoding mechanisms used
e. The receiver or destination of the messages
Describe:
a. The intrusion detection system (IDS)
b. The intrusion prevention system (IPS)
c. The firewalls that have been established
d. The link between the operating systems, the software, and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks’ networks.
Identify:
a. How banks use firewalls
b. How banks use IDSs
c. The difference between these technologies
Include:
a.The network infrastructure information
b. The IP address schemes that will involve the IP addressing assignment model
c. The public and private addressing and address allocations
d. Identify potential risks in setting up the IP addressing scheme
Here are some resources to review:
Intrusion detection & prevention (IDS/IPS) systems
Firewalls
Identify:
a.Any well-known ports and applications that are used
b.The risks associated with those ports and applications being identified and possibly targeted
Add your overview to your report.
Identify Network Attack
In this step, you will identify possible cyberattacks such as spoofing/cache poisoning, session hijacking, and man-in-the-middle attacks.
Provide techniques for monitoring these attacks using the knowledge acquired in the previous step. Review the following resources to gain a better understanding of these particular cyberattacks:
a.Session hijacking: spoofing/cache poisoning attacks
b. Man-in-the-middle attacks
One way to monitor and learn about malicious activities on a network is to create honeypots.
Propose a honeypot environment to lure hackers to the network and include the following in your proposal:
a. Describe a honeypot.
b.Explain how a honeypot environment is set up.
c. Explain the security and protection mechanisms a bank would need for a honeypot.
d. Discuss some network traffic indicators that will tell you that your honeypot trap is working.
Include this information in your final report. However, do not include this information in the bulletin to prevent hackers from being alerted about these defenses.
Identify false Negative and false positive.
identify the risks to network traffic analysis and remediation. Review the resources on false positives and false negatives and discuss the following:
Identify what are false positives and false negatives.
How are false positives and false negatives determined?
How are false positives and false negatives tested?
Which is riskier to the health of the network, a false positive or a false negative?
Describe your analysis about testing for false negatives and false positives using tools such as IDSs and firewalls, and include this as recommendations for the banks in your public service Joint Network Defense Bulletin.
Discuss the concept of performing statistical analysis of false positives and false negatives.
Explain how banks can reduce these issues.
Research possible ways to reduce these events and include this information as recommendations in the Malicious Network Activity Report.
Network intrusion analysis is often done with a tool such as Snort. Snort is a free and open-source intrusion detection/prevention system program. It is used for detecting and preventing malicious traffic and attacks on networks, analysis, and education. Such identification can be used to design signatures for the IDS, as well as to program the IDS to block this known bad traffic.
Network traffic analysis is often done using tools such as Wireshark. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software, and communications protocol development and education. Cybersecurity professionals must know how to perform network forensics analysis.
Determine Sensitivity of Your Analysis
In this step, In this step, you will determine which information to include in which document.
Information appropriate for internal consumption may not be appropriate for public consumption. The Joint Network Defense Bulletin may alert criminals of the network defense strategy. Therefore, be careful about what you include in this bulletin.
Once you have assessed the sensitivity of the information, including appropriate information in your Malicious Network Activity Report.
Then, include appropriate information in the Joint Network Defense Bulletin in a way that educates the financial services consortium of the threat and the mitigating activities necessary to protect against that threat.
Explain other detection Tools and Techniques
In this step, perform independent research and briefly discuss what other tools and techniques may be used to detect these signatures.
Provide enough detail so that a bank network administrator could follow your explanation to deploy your system in production. Include this information in the Joint Network Defense Bulletin.
Complete Malicious Network Activity Report
Now that you have gathered all the data for your Malicious Network Activity Report, it is time to organize and submit it. The following is a suggested outline:
a. Introduction: Describe the banking institution and the issue you will be examining.
b. Overview of the Network Architecture
c. Network Attacks
d. Network Traffic Analysis and Results
e. Other Detection Tools and Techniques
f. Recommended Remediation Strategies

Research Paper Sample Content Preview:

Malicious Network Activity
Name of the Student
Institutional Affiliation
Introduction
Threats related to cybersecurity are increasingly being experienced for all financial institutions both private and public. Despite numerous efforts to prevention, various financial institutions have reported cyber-attacks across the world. As a security officer in the FBI security agent, I have been deployed a number of times by banks to examine their network systems after experiencing cyber-attacks. Various banks always contact our department, seeking expertise in order to curb the menace. We have been informed that many files have been compromised and have witnessed the denial of service attacks interrupting client websites, bank networks, in addition to blocking a lot of cash in potential transactions. The effects of 1the attacks could shock a number of financial institutions, as well as the American economy. Banks, which have been listed as potential targets, will be examined for their protection and security. This report aims at presenting the efforts and outcomes from the recent cyber-attacks in our financial institutions in the recent past. It will be presented to Financial Services Information Sharing and Analysis Center (FS-ISAC) and New Horizon Bank. The goal of this operation is to trap cyber hackers to honeypots, which were set up within the New Horizon Bank.
Overview of the Network Structure
Network structures are at risk of cyber-attacks both from within and outside the organization. To understand the risks linked to the control systems we have to know the operations related to the control system, as well as know-how the hackers are using the system for their advantage. Figure 1 shows different methods, communication paths, and devices that can be used to communicate with the relevant components.
Figure 1: Communication access to control systems
-cert.gov/sites/default/files/transimages/figure1.jpg
As shown in figure 1, there are several ways to communicate with the control system network, as well as components using various communications and computing equipment. An individual who has knowledge in software applications, operating systems, networks, and process equipment can use these as well as other electronic ways to get access to the control system.
Network Attacks
In today's world, many people are using the internet in most of their daily activities. However, some people try to damage our internet networks, disrupt our privacy, as well as render our internet devices inoperable. The security of the network system has become an important topic due to the variety and frequency of existing attacks (Oprea, Li, Norris & Bowers, 2017). Criminals attacking network systems are mainly referred to as network crackers, hackers or attackers. Network attacks can be defined as any approach, procedure, or method employed to maliciously try to compromise the security of a certain network system. Attackers have various reasons for attacking the network system of an organization.
A network attack can be either an internal or external attack. Internal attacks mostly occur when an employee(s) is not satisfied with the day-to-day operations of the organization. On the other hand, external attacks happen from indivi...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!