You are on page 1of 4

Faculty of Business Management & Globalization

Faculty of Information & Communication Technology

IT3413 NetworkSecurity & Testing


Project Overview
One of the major tools for network security and testing is ethereal. Ethereal is a packet
sniffing tool that can eavesdrop over a connection and analyze the type of the transmitted
packet, the protocol that was used to deliver this packet, the encapsulation.. Etc.
As an ICT student you are required to be familiar with tools that can be used for packet
sniffing and analysis.
Project Title
Ethereal packet sniffing tool.
Project Requirement
You are required to prepare a manual of how use ethereal tool to sniff packets for the listed
application packets below:
1. HTTP/HTTPS packets, how to define the sender device and the receiver device from
sniffed packet(s). The information should also include the IP and the MAC address of
the sender and the receiver device, what type of encryption method, what
encapsulation. The tests should over a wired network and a wireless network. (
2. Ping or ICMP protocol, the information required follows the same mentioned in the
point above.
3. Demonstration is required for the mentioned tasks above.
4. Compare the tool with Wireshark tool and based on your own opinion, logic and
reasoning device a suggestion of which tool is better to use for packet sniffing and
analysis. The criteria of suggestion can be user-friendliness, better GUI or better
functions available.
Expected Outcome
As in the project, individuals may work together in analyzing the research topic. Each student
however, will be responsible for preparing his/her own explanation during the presentation
and the report. The paper length should be no less than 1000 words. It should include
information from no less than five independent sources and be referenced in accordance with
acceptable standards.
Charts, tables and diagrams are expected to illustrate the processes or workflow of the
program.
Expected Report Content:
1. Assignment Cover Page
2. Title of the Assignment

Page 1 of 4

3. Acknowledgement
4. Table of Content
5. Introduction
6. Connection setup.
7. Your findings on RPC/MPI/virtualization and etc.
8. Content - Coding and comments
9. Screen shots on the working applications.
10. Conclusion & Recommendation
11. Bibliography & References
12. Softcopy of coding, executable programs and reports.
Report Format:
Spacing
Font
Page Number

:1
: Arial size 11

SPECIFIC INFORMATION

Presentation will be based on the communication method that occurs between the
remote computers and detailed explanation the coding itself. Students should be able
to demonstrate working program/system that portray the implementation of the
distributed system in real scenario. LAN setup is required in order to show how
remote computers are connected and communicate with each other.
Ensure that your report is well organized so that each sections flows smoothly into
the next.
Be sure to check spelling error. Marks will be deducted for papers with excessive
grammar, punctuation and spelling errors.
MARKING CRITERIA
The following is the marks deduction for this individual assignment:
Late submission = 0.5% is given regardless of errors/mistakes.
Run-time errors = -0.2% is awarded immediately.
Not following question requirements = -0.5% is given as long as student never
follow any of the question requirements.
Plagiarism = 0% is awarded immediately.
Let others copy your work = 0% is awarded immediately.
Off topic work = 0% is awarded immediately.
RULES AND REGULATIONS

Plagiarism/Cheating is STRICTLY PROHIBITED and zero marks would be awarded.


Assignment to be submitted on time in line with professional requirements.
Late submission will NOT be entertained and marks will be deducted.
If you fall sick or have problems with your assignment, you must advise your
instructor immediately - at least a week before the assignment is due! (If you fall sick
a day or two before your deadline, tough luck!). So, you are advised to plan and work
on your assignment beforehand!

Page 2 of 4

Computer crashes are NOT excuses for late submission! ALWAYS BACKUP your
own works.

The assignment is to be submitted with a signed cover sheet [LUCT cover page]
available to confirm the time and submission date.

Importantly, you are required to keep a copy of all submitted assignments to


safeguard against loss or missing assignments!!!

This assignment is to be done in group.


It is reasonable to discuss with others possible general approaches to the given
problems.

You are NOT allowed to work together to get a detailed report, to copy a report, or to

give away a report.


If there is too much collaboration from your common discussion by looking at the
reports, in such instances of academic dishonesty may result in you getting zero
marks for this piece of assignment.

If someone cheats by using your work, you will be penalized.


Dateline is strictly Deadline. Please submit your assignment (Hardcopy and
softcopy of the report) during TUTORIAL hour. - Marks will be deducted 5% if
students submit the work through other lecturers or not in the correct time range
given.

Page 3 of 4

Marking Criteria:
Criteria
Format
- LUCT cover page(correct format)
- Page Number
- Font/Font Size
- Alignment

Total
Marks
10
2
2
3
3

Unity and Coherence


- Method of organization
- Transition and other connecting words
Summary
- Your findings on RPC/MPI/Socket
Programming/Virtualization and etc.
- Content - Coding and comments
- Screen Shots

5
2
3
30
10

Support/Content
- Relevance of points/topic sentences
- Adequate supporting points for the thesis
- Conclusion
- Plenty of evidence/examples for each
supporting points
Presentation/Demonstration of Working Program
- Sentences should flow smoothly and clearly
- Ability to related with Syllabus
- Team Work
- Initiative/Creativity
- Working System

20
5
5
5
5

10
10

Harvard Referencing

35
5
5
5
10
10
5
5

Total

105

Page 4 of 4

You might also like