Results
At first, we will take a look at some statistical numbers we have collected in the past months. We the help of the web interface, we can easily query the database to get a quick overview of peaks in the data set that we have collected:
• Average number of attack sources per day is 184.94
• Maximum number of attack sources per day was 2022 and happened at November
15, 2004.
The two number show that there is a high variation in the collected data about the number of unique attack sources per day. To take a closer look at this phenomenon, we present in Table 1 the number of unique sources for six different platforms. In addition, the ta- ble presents the average number of sources per day, which shows a high variation across different platforms as well.
Currently it is unclear why we have this high variation in the number of average source per day. One possible explanation for the high number of average sources for the first platform is the following: since this system is deployed within the network with the first octet 192, it presumably receives many packets from broken systems which use Network Address
Translation (NAT). Such a system often use the IP range 192.168.0.0/16 (defined in RFCWindows Others Unknown
Week 1 7235 18 10
Week 2 6839 26 5
Week 3 6475 38 -
Week 4 7766 89 -
Week 5 6594 24 64
Week 6 3599 5 58
Week 7 4640 11 92
Week 8 6247 20 83
Table 2: Operating system of attack source on weekly basis between January and February 2005
1918). If this system is infected
Scope: A range of IP addresses those are available to be leased to DHCP clients by the DHCP Server service.
In CIDR notation, the IP address and subnet mask 191.9.205.22 255.255.192.0 are written as. B
Rather than focus on the discrepancies found within each unit, we will look at the trends
During this period, the network identifies the product and assigns the IP address or hostname of the product.
The channel which switches the multiple requirements and multiplexes the data transmissions from these devices a byte at a time is recognized as.....
Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.
Also, in question number 1 she’s showing charts to support her data, but there is not a reference to where she got that information. A little citation below the charts will improve citation for the charts.
Reread the Open Systems resource (found in the resources tab) to help construct your answer.
- Because all available data was used, there is a greater sample in our analysis. We assume that more data points will lead to a more accurate conclusion.
Albeit the greater part of this data sounds bravo, awful for us, there are a few shortcomings from their arrangement. The general population are as
Though it is not the lowest figure recorded since 2004/05 baseline, the latest figure still represent a statistically significant change between the time period of 2004/05 and 2012/13 (McGarry, Simpson & Hinchliff‐Smith, 2011).
The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is
Following in our analysis, we are going to take a look in the external environment of Lannet Communications.
A number from one to seven was assigned to seven different 30 minute time intervals during the day. To avoid bias, a TI-84 calculator was used to select the timeframe of observations for each day from Monday to Friday. The first five numbers generated was the timeframes that we used for the observation. The randomly selected time(s) are summarized on Table 1.0 on the right.
sample number: Increase in sample number through increasing sample number or repeating same experiment multiple times causes mean of the result (M) to get closer to true mean, thus reducing variability.