Present the Research Question and provide a 2-page analysis of the methodology to be employed for the Research Question.To complete this assignment,
Present the Research Question and provide a 2-page analysis of the methodology to be employed for the Research Question.To complete this assignment, the following must be observed:
- Adhere to and properly apply the Basic Citation Styles of the APA.
- Do not copy and paste information from the Internet. Paraphrase your sources but remember to cite every source you use.
- Use the Sample – APA – Paper provided as a formatting guide to submit your assignment ("Check for grammatical errors").
- References list must be formatted per APA.
4
Project Name and Idea for Network and Security
Student's Name
University Name
Course
Professor's Name
Date
Project Name and Idea for Network and Security
Project name: Network Traffic Analysis
Network traffic analysis is a cybersecurity project performed on the network and security systems. A network traffic analysis project is based on sniffing the packets in each network to monitor each packet passing through the organization's network (Papadogiannaki & Ioannidis, 2021). The project involved integrating different techniques to analyze the social structure of the network and the activities involved. To perform this activity, permission from the respective organization is required as it is performed on the whole network system of the organization to get the cybercriminals who intend to steal the organization's private information.
Monitoring the network to identify the anomalies of every activity that promotes security and the ones that lead to insecurities is essential to every organization. The majority of the sensitive information is transported from the user to the receiver through the network system. When the information is in the network, it is accompanied by many anomalies, especially from hackers trying to get information without authorization. When such happens to an organization, many losses, including financial, resources, reputation, and customers, will be experienced by the organization.
The network traffic analysis (NTA) project creates a real-time solution to detect different types of malware to counter these losses. To effectively perform such a project, two methods are involved, passive and active analysis (Mousavi, Khansari, & Rahmani, 2020). In the passive analysis method, the ones involved with the project track the attacker's features from one side of the network and then use the information to look for vulnerabilities or traces on the other side of the network.
The active traffic analysis is performed on the network's real-time basis, where the packet flow's timing is used. The one penetrating the internet behaves like an attacker and monitors the flow of packets in a specific pattern on either side of the network (Shahid et al., 2018). Determining the flow of packets on either side of the network helps determine the packets' characteristics with the message intended. The packets from cybercriminals will have some anomalies and will be well identified using the NTA security method.
Passive and active traffic analysis methods are used with other analysis tools. Their main aim is to determine the pattern of packets in the network and the noise accompanied by each packet. Recognizing the anomalies in the packet transportation throughout the network with the different variety of noises is one of the best activities for ensuring a secure network in the organization.
The project applies to all the organizations that have implemented a network for sharing information from one user to another. To mention a few, we have military, e-commerce, manufacturing, corporations, educational institutions, government, and non-government organizations, among others. The professionals involved with the NTA can either be internal or external, provided the detection, diagnosis, and resolution of the network issues have been achieved.
Organizations with sensitive information should incorporate these projects to secure the network. This is because it enables them to identify the frequency of communication, lack of activity in the network, who talks with who and when, and the flow of information from one person to another. It is an important activity as it helps in fast determining the cybercrime activities that are very costly to the company.
References
Papadogiannaki, E., & Ioannidis, S. (2021). A survey on encrypted network traffic analysis applications, techniques, and countermeasures. ACM Computing Surveys (CSUR), 54(6), 1-35.
Mousavi, S. H., Khansari, M., & Rahmani, R. (2020). A fully scalable big data framework for botnet detection based on network traffic analysis. Information Sciences, 512, 629-640.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.