Skip to content

cybertrainingrange/Sprint4

Repository files navigation

Cyber Range Team Capstone Project Summary - Sprint 4

Monitoring and Traffic Analysis Learning Environment

App Screenshot
According to Statista, the internet amounts to about 5.16 billion users, roughly 64.4% of the global population (Statista, 2023). This rapidly growing ecosystem is a vital consideration when discussing network performance and the methods practiced to ensure that connected systems operate at proficient speed and deliver highly available services to users. Network performance issues imminently arrive, and when they do, it is the task of professionals to address these issues with solutions that improve communications and allow them to see what’s going on under the hood with every connection in the network.
App Screenshot
Analyzing network protocols is a crucial aspect of network troubleshooting, security analysis, and performance optimization. The OSI model and the TCP/IP model serve as frameworks for understanding and dissecting the different layers of network communication. The OSI model has seven layers involved in network communication, providing a systematic approach to understanding and organizing the functions required for transmitting data between devices in a network. The TCP model, also known as the Transmission Control Protocol model, is a specific implementation of the OSI model's network layer and transport layer, focusing on establishing reliable connections and ensuring error-free data transmission over the internet.
Network protocols govern the rules and procedures for data communication between devices in a network. Network protocol analysis is the process of examining the data packets that are transmitted over a network. This can be done for a variety of purposes, including troubleshooting network problems, detecting security threats, and analyzing network traffic. To analyze network protocols effectively, professionals often rely on tools like Wireshark or other neutral vendor tools, which provide detailed insights into the traffic flowing through the network.
App Screenshot
Wireshark is a software tool that helps you analyze network traffic. It allows you to see the data that is being sent and received over a network, such as the Internet or a local network. Think of it as a network "sniffer" or a digital detective that captures and displays the conversations happening between different devices on a network. When you run Wireshark on your computer, it starts capturing packets of data that are flowing through your network interface. These packets contain information about the source and destination devices, the type of data being transmitted, and other details. Wireshark then organizes and presents this information in a readable format. By examining these packets, you can gain insights into network-related issues, troubleshoot problems, or even analyze network security. For example, if you're having trouble connecting to a website, you can use Wireshark to inspect the packets and see if there are any errors or communication issues. Wireshark provides a graphical user interface (GUI) where you can view and filter the captured packets. You can drill down into individual packets to see their contents, like the actual data being sent, the protocol used, and other metadata. It can also decode encrypted traffic if you have the necessary encryption keys.
App Screenshot
Network Miner is a commercial network protocol analyzer. It offers a number of features that are not available in Wireshark, such as the ability to decode encrypted traffic. Tcpdump is a command-line network protocol analyzer. It is a powerful tool, but it can be difficult to use. Ngrep is a command-line network protocol analyzer that is similar to tcpdump. It is easier to use than tcpdump, but it does not offer as many features. Microsoft Network Monitor is a commercial network protocol analyzer that is included with Windows Server. It is a powerful tool, but it is not as widely used as Wireshark or Network Miner.
App Screenshot
Nagios is a monitoring system that helps organizations track and manage the health and performance of their IT infrastructure, providing real-time alerts and comprehensive insights to ensure smooth operations.
A closer look at Wireshark can reflect how many of these tools’ frameworks and methodologies find practical applications. Wireshark assists network administrators in diagnosing and resolving network issues by capturing and analyzing packets to identify network misconfigurations, latency problems, or packet loss. Wireshark helps optimize network performance by capturing and analyzing traffic patterns, identifying bottlenecks, and fine-tuning network configurations. Wireshark plays a crucial role in security analysis, aiding in the identification of network attacks, intrusion attempts, and suspicious behavior. It enables incident response teams to understand the nature of security incidents and take appropriate countermeasures. Wireshark is widely used in the development and testing of network protocols. Its ability to dissect and analyze packets assists protocol developers in validating their implementations and identifying compatibility issues.
Ultimately, the cyber training range will enable students to understand the different tools used to analyze performance issues and also gain the ability to identify, measure, and troubleshoot the key metrics of network performance.

Technical Documentation 🛠

Technical Documentation

Agile Framework ⚓

App Screenshot

Team A Members 👩‍💻|👨‍💻

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published