0% found this document useful (0 votes)
17 views4 pages

CN Assignment

The document presents a case study of TechNet Solutions, which faced slow internet and network issues due to unusual traffic linked to potential security threats. The IT team analyzed the problem, identified infected computers, and implemented solutions including malware removal, firewall updates, and employee training. The outcome was a restored network performance and enhanced security measures to prevent future attacks.

Uploaded by

2317061
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

CN Assignment

The document presents a case study of TechNet Solutions, which faced slow internet and network issues due to unusual traffic linked to potential security threats. The IT team analyzed the problem, identified infected computers, and implemented solutions including malware removal, firewall updates, and employee training. The outcome was a restored network performance and enhanced security measures to prevent future attacks.

Uploaded by

2317061
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

23AD43C- COMPUTER NETWORKS

CO4 Scenario based assignment

Title: Scenarios that analyzing the network traffic

PRIYADHARSHINI R
2317063

1. Introduction

In modern computer networks, smooth data flow is essential for business operations.
However, network issues such as slow internet speed, high bandwidth usage, and potential
security threats can affect performance. This case study examines an unusual network traffic
issue in a company and how it was analyzed and resolved.

2. Case Study Scenario: Unusual Network Traffic in a Company


Problem:

A company named TechNet Solutions faced slow internet and network issues. Employees
reported that:

 Websites loaded very slowly.


 Video calls frequently froze.
 File transfers took a long time.

The IT team checked the network and found a lot of data being sent out from several
computers, especially late at night when no one was working. They suspected a security issue
and used special tools to monitor network traffic. The tools showed that the extra traffic was
going to an unknown IP address outside the company.
Here is a dual-axis graph showing packet loss (%) and network latency (ms) over 24
hours.

3. Analysis of the Problem


Step 1: Detecting the Unusual Traffic

 Network monitoring tools (like Wireshark and NetFlow) showed that some computers
were sending large amounts of data.
 The data was being sent at unusual hours, when no employees were working.
 The destination was an unknown external server, which was suspicious.

Step 2: Identifying Possible Security Threats

 Some computers showed failed login attempts, suggesting that someone was trying to
hack into them.
 Some devices were infected with malware, meaning hackers might have taken control
of them.
 The unknown IP was linked to cybercriminal activities, making the situation more
dangerous.

Step 3: Understanding the Impact

 The company’s internet was slow because the network was overloaded.
 Employees were unable to work efficiently.
 The company risked losing sensitive data to hackers.

Here is a network traffic graph showing normal fluctuations and a sudden spike at
the 18th hour, indicating unusual activity
4. Solution to the Problem
Step 1: Stop the Problem

 The IT team identified and disconnected infected computers.


 They scanned and removed malware from those devices.
 They checked other computers to ensure they were safe.

Step 2: Block the Hacker

 The firewall was updated to block the suspicious IP address.


 Router logs were checked to make sure no other devices were sending data.
 An alert system was enabled to detect future attacks.

Step 3: Improve Network Security

 All passwords were changed to prevent hackers from re-entering.


 Computers and software were updated with security patches.
 Multi-Factor Authentication (MFA) was enabled for extra security.

Step 4: Train Employees

 Employees were trained to identify phishing emails.


 They were told to avoid clicking on unknown links.
 A policy was set for regular security updates and checks.
Step 5: Prevent Future Problems

 The IT team continuously monitored network traffic.


 Advanced security tools were used to detect and block threats.
 Regular security audits were scheduled to check for vulnerabilities.

5. Final Outcome

 The infected computers were fixed and secured.


 The network became fast again, allowing employees to work smoothly.
 Security was improved, reducing the risk of future attacks.

6. Conclusion

This case study highlights the importance of network monitoring and cybersecurity in
businesses. By quickly detecting and resolving unusual network traffic, companies can
protect their data and ensure smooth operations. Regular security updates and employee
awareness play a crucial role in preventing future cyber threats.

You might also like