Overview of Network Security

Assessment Details and Submission Guidelines
Trimester T2 2019
Unit Code MN502
Unit Title Overview of Network Security
Assessment Type Individual Assessment
Assessment Title Potential threats and mitigation tools for Botnet (Assignment one)
Purpose of the
assessment (with
ULO Mapping)
Students should be able to demonstrate their achievements in the following
unit learning outcomes:
b. Analyse and discuss common emerging threats, attacks, mitigation
and countermeasures in networked information systems
Weight 15%
Total Marks 70
Word limit 1500 – 2000
Due Date Thursday 29/08/2019
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.

MN502 Overview of Network Security Page 2 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr SM Farhad July 2019
Assignment Description
The security remains a challenge in networked information systems. The ubiquity and
increasing popularity of the cyber physical systems have made networked devices a powerful
amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious
software (Malware). Generally, Malware are classified based on their primary traits. One of
the primary traits of Malware is Payload capabilities.
“One of the most popular payload of Malware today is software that will allow the infected
computer to be placed under the remote control of an attacker for the purpose of launching
attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands,
or even millions of bot computers are gathered into a logical computer network, they create
a botnet under the control of a bot herder” [1].
Assume you have an interview for a cyber-security analyst position with Silver Security
Solutions company. You are supposed to be prepared about the botnet, their types, threats,
and mitigation tools. In this context write a report including the following sections:
A. Introduction about Botnet and its impact on the society. This section must discuss
the report outline
B. Discussion of any three variants of Botnet
C. Botnet Architecture
D. Botnet operation and communication
E. Potential threats posed by a Botnet
F. Recommendations on any two mitigation techniques/tools to tackle the Botnet
attack and discuss the effectiveness of the selected tools
G. Discussion on any three Networked Applications targeted/attacked by Botnet from
current literature review
H. Summary
I. References
The Viva voce (oral exam) of the assignment will take place during Laboratory session in Week
8. The student has to answer the viva questions related to the assignment.
[1] M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018.
MN502 Overview of Network Security Page 3 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr SM Farhad July 2019
Assignment Instructions:
 Do not use Wikipedia as a source or a reference
 Must consider at least five current references from journal/conference papers and
books. Must follow IEEE referencing style.
 Make sure you properly reference any diagrams/ graphics used in the assignment.
 Must submit assignment as a Word document in the Moodle Link
 Viva voce (oral exam) is a hurdle for this assignment. Failing to appear for viva voce
will result in securing a maximum of 60% marks of the assignment.
Marking Criteria for the Assignment 1

Sections No. Description of the section Marks
Introduction This section must include
 Introduction about Botnet [2 Marks]
 Discussion about the impact of Botnet on the
society [2 Marks]
 The report outline [1 Mark]
05
Variants of Botnet Discussion of any three variants of Botnet
 Draw taxonomy [2 Marks]
 Discuss the variants of Botnet [6 Marks]
08
Botnet
Architecture
Explain the Botnet Architecture 05
Operation and
Communication
Discuss Botnet operation and communication. 05
Potential Threats Analyse critically any three potential threats posed by
Botnet
09
Mitigation
Techniques/Tools
Recommend any two mitigation techniques/tools to
tackle the Botnet attack and discuss the effectiveness of
the selected tools
08
Networked
Applications
Targeted/Attacked
Discuss any three Networked Applications
targeted/attacked by Botnet from current literature
review.
09
Summary Summarise the overall contributions of the report 05
References  Must consider at least five current references
from journal/conference papers and books.
 Must follow IEEE Transactions on Networking
style
04
Viva voce Viva voce (oral exam) is a hurdle for this assignment.
Student must appropriately answer the viva questions
related to the assignment.
12
Total Marks 70

MN502 Overview of Network Security Page 4 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr SM Farhad July 2019
Example Marking Rubric for Assignment

Grade
Mark
HD
80% +
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
/5
Introduction is
very well written
with very clear
background,
discussion about
the impact of
Botnet on the
society, and the
report outline
Introduction is well
written with clear
discussion about
the impact of
Botnet on the
society, and the
report outline
Introduction is
generally
presented in good
fashion, however
missing one
element such as
the impact of
Botnet on the
society/ the report
outline
Introduction is
presented briefly
with some relevance
and missing
elements such as the
impact of Botnet on
the society/ the
report outline
Poor
Introduction
with irrelevant
details
Variants of Botnet
/8
In-depth and very
clear discussion
about three
variants of Botnet
Very clear
discussion about
three variants of
Botnet
Generally good
discussion about
three variants of
Botnet
Brief discussion about
some three variants of
Botnet
Poor discussion
with irrelevant
information
Botnet
Architecture
/5
Excellent
discussion about
the architecture
Very good
discussion about
the architecture
Good discussion
about the
architecture
Brief discussion about
the architecture
Unsatisfactory
discussion
Operation and
Communication
/5
A very detailed and
very clear
explanation
Very clear
explanation
Generally good
explanation
Brief discussion
explanation
Poor discussion
with irrelevant
information
Potential Threats
/9
A very clear and in
depth discussion
about potential
threats
Very clear
discussion about
potential threats
Generally good
discussion about
potential threats
Brief discussion about
the potential threats
Poor discussion
about potential
threats with
irrelevant
information
Mitigation
Techniques/ Tools
/8
An in-depth and
very clear
discussion about
Mitigation
techniques/tools
and their
effectiveness
Very clear
discussion about
Mitigation
techniques/tools
and their
effectiveness
Generally good
discussion about
Mitigation
techniques/tools
Brief discussion about
Mitigation
techniques/tools
Irrelevant
discussion about
the mitigation
techniques/tools
Networked
Applications
Targeted/Attacke
d
/9
A very detailed and
very clear
explanation about
three application
Very clear
explanation about
three application
Generally good
explanation
Brief discussion
explanation
Poor discussion
with irrelevant
information
Summary
/5
A section very
clearly
summarizing the
overall contribution
A section clearly
summarizing the
overall contribution
Generally good
summary of the
report
Brief summary of the
report with some
relevance
Summary not
relating to the
report
References
/4
Clear styles with
excellent source of
references.
Clear referencing/
style
Generally good
referencing/style
Unclear
referencing/style
Lacks consistency
with many errors.
Viva voce
/12
Answered all the
questions
appropriately and
accurately
Answered all the
questions with
some clarity
Answered all the
questions with little
in-depth knowledge
Answered about 50%
of the questions.
Answers were
irrelevant