Investigate how this particular attack can be detected, for example by a system administrator.

Publish By: Admin,
Last Updated: 10-Jul-23
Price: $120

Assignment Tasks - In this coursework you are expected to:

1. Examine a known vulnerability present in software running on a host-machine or network component. The vulnerability should be chosen from one of the topic areas covered in the module. For example:

- Host-based security: software security, flaws in programs (buffer overflows, stack smashing), access control mechanisms (ACLs, UNIX file permissions, MAC, DAC, RBAC), authentication technologies (passwords, password management, biometrics, tokens, multi-factor)

- Network security: security protocols, cryptography (e.g., AES, RSA, digital signatures, key management (PKI, x.509)), link-layer security (e.g., ARP cache poisoning), transport-layer security (e.g., TLS), application-layer security (e.g., DNS/DNSSEC, firewalls, intrusion detection systems, wireless and mobile security)

2. Analyse the underlying flaw, including describing technical details and making appropriate reference to the academic literature, the CVE and CWE databases.

3. Find an exploit for this vulnerability and demonstrate how a successful attack can be launched in a virtual environment.

4. Investigate how this particular attack can be detected, for example by a system administrator.

5. Critically analyse countermeasures that can prevent or at least mitigate the risk of this attack, making appropriate reference to security design principles.

You will be given opportunity to find a suitable vulnerability during the lecture week and can ask advice from your tutor as to the feasibility of your choice.