Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Assignment. Your boss has had an intrusion (or so she says) on his home network.

by | Nov 26, 2021 | Computer Science homework help


If you need assistance with writing your essay, our professional Essay Writing Service is here to help!



Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze.
She says:
“Something has happened on my home network. I use my network for internet access so I can access read email (remember my AT&T email account). I am not sure whether this event(s) should cause me concern or not, but I was lucky to be running Wireshark when the event occurred. I will email you the Wireshark capture file so you can analyze the capture file and tell me what occurred during the internet session.”
1) Open the capture file (by clicking Here) using any tools you see fit
2) Perform an analysis on the captured traffic. Some things you should consider are the following (not all of these happened and may not be all inclusive either):
a. How long did the session capture last?
b. How many packets were captured?
c. How many bytes were captured?
d. What protocols were observed?
e. When did the bulk of the data get transmitted?
f. What caused this transmission spike?
g. Were any ISP sites accessed? If so which ones? What accounts?
h. What is the name of the host computer? It’s IP address?
i. What Operating system is it using?
j. What does the local network look like?
k. What device names are on the local network?
l. Did I access any other computes on the local area network?
m. Are any other devices on the network?
3) What “story” does the capture file tell?
4) Run the capture file through SNORT. What alerts are triggered?
Provide a lab report, which will includes the answers to the questions above and an analysis of what actually happened during the network session. Identify the key events and either prove or disapprove that a malicious event occurred.
When referencing the answer to questions or providing proof of your analysis it might be helpful to reference the actual packet number that proves your point.
GRADING: The grade will come from your paper, and supporting documentation. Papers which are clearly organized, referenced, describe the sequence of events and subsequent analysis, and provide sound conclusions based on the presented analysis/evidence will be graded higher. Limit your response to no more than 5 pages. This assignment counts as a double-lab grade.





What We Do


Essay Writing Services


Term Paper Writing Services

Assignment Writing Service


Research Paper Writing

Case Study Writing Services


Thesis Writing Services


What People Are Saying

I had casually placed an order on for a short essay and wanted to see if their claim of timely delivery of tasks was true or not. The assignment was not delivered on time, but the quality of the essay was also remarkable.

Adeline West

“Being associated with experts minds for 1 year, i am extremely happy and fully satisfied with your high class assistance and quality writing services! Cheers!”


“Thanks guys! You have great writer who helped me in my last assignment! I got excellent grade in my last assignment and i will recommend you!”

Theresa Reeves

“It was awesome experience to work with professional writers of experts ! This really helps to score high in university homework!”

Ada Leonard

Easy As 1…2…3…

1. Place Order/Submit Instructions
Submit the instructions in the order form. Add the number of the pages, the deadline, and attach any additional files.

2.Make Payments
Securely complete the payment process.

3. Writer Upload Solution for Quality Check

We will assign your work a writer, sit back and relax. The Quality Control department will check and verify completion to set standards.

4. Download Paper and Enjoy
Now download the uploaded solution and enjoy your life.


We encrypt everything. It’s all confidential.

Secure Payment

Sleep tight: each transaction is encrypted and 100% secure.

Ready to get started?

%d bloggers like this: