23AD43C- COMPUTER NETWORKS
CO4 Scenario based assignment
Title: Scenarios that analyzing the network traffic
PRIYADHARSHINI R
2317063
1. Introduction
In modern computer networks, smooth data flow is essential for business operations.
However, network issues such as slow internet speed, high bandwidth usage, and potential
security threats can affect performance. This case study examines an unusual network traffic
issue in a company and how it was analyzed and resolved.
2. Case Study Scenario: Unusual Network Traffic in a Company
Problem:
A company named TechNet Solutions faced slow internet and network issues. Employees
reported that:
Websites loaded very slowly.
Video calls frequently froze.
File transfers took a long time.
The IT team checked the network and found a lot of data being sent out from several
computers, especially late at night when no one was working. They suspected a security issue
and used special tools to monitor network traffic. The tools showed that the extra traffic was
going to an unknown IP address outside the company.
Here is a dual-axis graph showing packet loss (%) and network latency (ms) over 24
hours.
3. Analysis of the Problem
Step 1: Detecting the Unusual Traffic
Network monitoring tools (like Wireshark and NetFlow) showed that some computers
were sending large amounts of data.
The data was being sent at unusual hours, when no employees were working.
The destination was an unknown external server, which was suspicious.
Step 2: Identifying Possible Security Threats
Some computers showed failed login attempts, suggesting that someone was trying to
hack into them.
Some devices were infected with malware, meaning hackers might have taken control
of them.
The unknown IP was linked to cybercriminal activities, making the situation more
dangerous.
Step 3: Understanding the Impact
The company’s internet was slow because the network was overloaded.
Employees were unable to work efficiently.
The company risked losing sensitive data to hackers.
Here is a network traffic graph showing normal fluctuations and a sudden spike at
the 18th hour, indicating unusual activity
4. Solution to the Problem
Step 1: Stop the Problem
The IT team identified and disconnected infected computers.
They scanned and removed malware from those devices.
They checked other computers to ensure they were safe.
Step 2: Block the Hacker
The firewall was updated to block the suspicious IP address.
Router logs were checked to make sure no other devices were sending data.
An alert system was enabled to detect future attacks.
Step 3: Improve Network Security
All passwords were changed to prevent hackers from re-entering.
Computers and software were updated with security patches.
Multi-Factor Authentication (MFA) was enabled for extra security.
Step 4: Train Employees
Employees were trained to identify phishing emails.
They were told to avoid clicking on unknown links.
A policy was set for regular security updates and checks.
Step 5: Prevent Future Problems
The IT team continuously monitored network traffic.
Advanced security tools were used to detect and block threats.
Regular security audits were scheduled to check for vulnerabilities.
5. Final Outcome
The infected computers were fixed and secured.
The network became fast again, allowing employees to work smoothly.
Security was improved, reducing the risk of future attacks.
6. Conclusion
This case study highlights the importance of network monitoring and cybersecurity in
businesses. By quickly detecting and resolving unusual network traffic, companies can
protect their data and ensure smooth operations. Regular security updates and employee
awareness play a crucial role in preventing future cyber threats.