top of page

Project 4

Objective:
Analyze network traffic in a simulated environment to detect anomalies and potential cybersecurity threats.

Network Analysis

Network Traffic Analysis

What I Did:

​

  • Packet Capture and Analysis:
    Utilized Wireshark to capture network traffic, inspecting packets in real time to identify patterns and anomalies.

  • Threat Identification:
    Detected and analyzed common network-based attacks, such as ARP spoofing and DNS poisoning, by scrutinizing packet data for suspicious behaviors and indicators of compromise.

  • Troubleshooting and Insight Generation:
    Investigated anomalies to understand their root causes, demonstrating a methodical approach to network troubleshooting and security monitoring.

  • Documentation:
    Compiled findings into a comprehensive report that highlighted suspicious activity, explained potential impacts, and recommended mitigation strategies.

​

Key Skills Demonstrated:

  • Packet capture and inspection using Wireshark

  • Identifying and analyzing common network-based attacks

  • Network troubleshooting and anomaly detection

  • Report creation and threat documentation

​

Outcome:
Through this project, I developed a deeper understanding of network traffic and the techniques required to identify potential threats. It enhanced my ability to use industry-standard tools and interpret network data effectively, furthering my skills in network analysis and cybersecurity.

bottom of page