ISCS 3523 Event Analysis Lab2
ISCS 3523 Event Analysis Lab2
STUDENT ID#
LAB#
10/15/2022
ISCS 3523
Event Analysis
I open the given capture file using the SimSpace tools Network Miner, Brim, Wireshark and
SNORT on any Win-Hunt VM.
I perform an analysis on the captured traffic and I consider the following things;
a. How long did the session capture last?
Answer: The total time of taken by the session is 8.96900 seconds as shown in the
screenshot below.
Screenshot taken form snort’s results
1|Page
Screenshot taken form Snort’s results
2|Page
Screenshot taken form Snort’s results
3|Page
f. What caused this transmission spike?
Answer: Because of downloading and accessing image files using HTTP over TCP causes
this transmission spike.
g. Were any Internet Service Provider sites were accessed? If so which ones? What
accounts?
Answer: Yes, the internet service provider “homeportal.gateway.2wire.net” was accessed the
detail [3] is shown in the screenshot below.
4|Page
i. What Operating system is it using?
Answer: It using Windows Professional SP4 Operating System as shown in the screenshot
below.
5|Page
k. What device names are on the local network?
Answer: The devices on the local network are;
homeportal.gateway.2wire.net
Kaufman Upstairs
DVR 8525.local
Kaufman Upstairs “IP network camera”
6|Page
4) Run the capture file through SNORT. What if any alerts are triggered?
Answer: I run the file through SNORT [4] and I found that there are two types of alerts are
triggered that are shown in the screenshots below.
7|Page
Bibliography
[1]. Jain, G. (2021, March). Application of SNORT and Wireshark in network traffic analysis. In
IOP Conference Series: Materials Science and Engineering (Vol. 1119, No. 1, p. 012007). IOP
Publishing.
[2]. Kurose, A.J. and Ross, K.W., 2005. Supplements: Wireshark Labs.
[3]. Volarević, I., Tomić, M., & Milohanić, L. (2022, May). Network forensics. In 2022 45th
Jubilee International Convention on Information, Communication and Electronic Technology
(MIPRO) (pp. 1025-1030). IEEE.
[4]. Rehman, R. U. (2003). Intrusion detection systems with Snort: advanced IDS techniques
using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional.
8|Page