Recent Question/Assignment

Hi
This assignment is due on 10th may. You will have to read this assignment very carefully since this is a major assignment. I have attached a zip file which include a PDF and access logs which should be used in the assignment.
This assignment should be submitted as a video therefor I will need a video explanation along with the transcript
Transcript of what to talk and video explanation to confirm the code is working is compulsory.

CSP2101 Scripting Languages
Assignment 3 - Software Based Solution
Due Date: Thursday 13 May by 17:00 AWST
Contents
Unit Learning Outcomes aligned with this assessment 1
Course Learning Outcomes aligned with this assessment 1
GENERAL REQUIREMENTS 2
IMPORTANT NOTES 2
Assignment Description 4
Part 1 – Write the Code (Shell Script, 30 marks) 4
Functional Requirements (15 marks) 4
Usability, Reliability and Efficiency Requirements (10 marks) 5
Enhanced Functionality (5 marks) 5
Part 2 – Explain Your Work (Video, 10 Marks) 6
Required Video Elements 6
Recording and Submitting a Panopto Video for Assessment – How To 6
Marking Key 7
Unit Learning Outcomes aligned with this assessment
UO 2: Design software solutions to perform desired tasks.
UO 3: Develop and deploy scripted software solutions using industry standard scripting languages to meet
functional requirements.
Course Learning Outcomes aligned with this assessment
CLO 2: Apply comprehensive knowledge of concepts, principles, and techniques in the cyber security discipline to both theoretical as well as practical situations.
CLO 3: Apply creative thinking to identify and solve cyber security challenges.
GENERAL REQUIREMENTS
? Your script will be marked on a standard Linux installation using the bash shell.
? You must only use bash shell script as covered in lectures and workshops.
? Refrain from using non-core commands, tools and utilities in your bash shell scripts. Non-standard bash commands, tools and utilities will not be downloaded and installed by your tutor.
? Ensure each script you write is fully self-contained and is not configured to be dependent on external files, libraries or resources to run.
? Do not use the trap command in any of your scripts.
? Each script you submit must contain your full name and student number at the beginning as code comments.
IMPORTANT NOTES
? This is an individual assignment only and must not be completed in collaboration with other students
? You may not work with others, acquire code from others, or provide code to others
? Further, you may not post any of the assignment tasks below to a code-development community of any kind seeking solutions or advice
? Nor may you copy and paste or otherwise reproduce code provided by external sources and use it as part of your own solutions unless it is cited in-code according to APA 7 referencing guidelines. The more code that is externally sourced, the less original your own solution, the lower your potential mark for the given requirement(s)
? Where it is found that any of these instructions have been ignored, academic misconduct proceedings may be initiated
? Please read the checklist below and watch the associated video BEFORE submitting your assignment
Watch this video before submitting your assignment
Assignment Description
Having completed your two main portfolio activities, you are now required to further develop your shell scripting skills by developing a script that automates a task commonly performed by Linux administrators - the analysis of server access logs to identify and report upon suspicious activity.
To develop and test your script, you have been provided with a set of five (5) server access logs in a zip folder named serv_acc.zip.
Please note: Your tutor will run your script in the same folder as the server access logs located on his/her computer so you do not have to prompt the user for their location.
Each server access log contains 500 records organised into the following columns:
DATE Not required for the assignment
DURATION Not required for the assignment
PROTOCOL TCP, UDP, ICMP, GRE
SRC IP Various codes
SRC PORT Port from which incoming packets have been sent
DEST IP Various codes
DEST PORT Port to which incoming packets have been sent
PACKETS Number of packets sent in a transfer
BYTES Size of packets sent in a transfer
FLOWS Not required for the assignment
FLAGS Not required for the assignment
TOS Not required for the assignment
CLASS suspicious or normal
Part 1 – Write the Code (Shell Script, 30 marks)
Functional Requirements (15 marks)
Your server access log must provide the user with the following functionality:
1. Run a search on available server access logs based on one (1), two (2) and three (3) field criteria inputs.
2. Give the user the option to a) search all server access logs available in a directory, or b) search just one (1) specific log of the user’s choice.
3. Export the results of any search to a text file and destination directory of the user’s choosing. Where the file and/or destination directory nominated by the user are non-existent, your script will create them.
4. Any records in which the CLASS field is set to normal are to be automatically excluded from the search results printed to the screen
5. When the PACKETS and/or BYTES fields are used as search criteria, the user should be able to choose greater than (-gt), less than (-lt), equal to (-eq) or not equal to !(-eq) the specific value they provide.
6. When the PACKETS and/or BYTES fields are used as search criteria, totals for each of these should also be calculated and displayed as the final row of the search results printed to the screen
7. When the SRC IP or DEST IP fields are used as search criteria, the user should only need provide a partial search string rather than a complete value, e.g. search using the partial string EXT rather than the exact value EXT_SERVER
Usability, Reliability and Efficiency Requirements (10 marks)
1. All string-based searches should be case insensitive.
2. The results of any search are to be printed to the screen in a columnar format, uniformly aligned and spaced.
3. All user inputs are to be fully validated and sanitised as required to ensure the correct execution of subsequent code.
4. The script is to display a high level of abstraction, .i.e. the hard-coding of values is to be avoided.
5. The efficiency of your code will also be considered, hence the degree of thought you apply to the selection of and interaction between shell script elements such as logical tests, control structures (ifelif-fi, loops, arrays), functions, command substitution, regular expressions, piping, redirection and utilities, e.g. awk, is important.
6. The user must be able to conduct as many search operations as they wish without the script terminating. Hence, the script must continue to run until the user specifically chooses to terminate it via a menu option.
7. All menus, options and prompts are to be easily understood and require minimal input from the user in response.
8. Sound code structure and full commenting will be examined by your tutor and factor into your grade.
Enhanced Functionality (5 marks)
Enhance the functionality of your server access log analysis tool by devising and coding one (1) additional feature that is not available as one of the default features listed under the Functional Requirements section of this brief. This additional feature is to allow the user to work with the server access logs in a useful and meaningful way that adds genuine value to the analysis tool. An example might be to provide the user with the ability to send a server access log analysis report to a specified email address instead of the default option of storing it as a text file in a given directory. Please do not use this example as your additional feature – it is provided as an example only.
Part 2 – Explain Your Work (Video, 10 Marks)
Required Video Elements
Record a video using Panopto that fulfills the following criteria:
? Begin with you appearing on-screen displaying your Student ID card and verbally stating your full name and student number.
? A full run-through of your code demonstrating Functional Requirements 1 through 7 in action.
? Explain how you have addressed Usability, Reliability and Efficiency Requirements 1 through 8, pointing to specific example(s) in the code and code output in each case.
? Explain and demonstrate the Enhanced Functionality achieved by the one (1) additional feature you created that allows the user to work with the server access logs in a useful and meaningful way that adds genuine value to the analysis tool.
? Change one element of code, e.g., such as a message displayed when invalid input is provided and then re-run the code to show the change in action.
? If there was any Functional or Usability, Reliability and Efficiency requirements you were not able to implement then briefly explain the reasons why this was the case, e.g. ran out of time, couldn’t figure out the code required, etc.
? Both the video and audio elements of your presentation should be of good quality.
? Your video must not be more than 8 minutes long, i.e. your tutor will stop viewing your presentation at the 8 minute mark and anything thereafter will not factor into your grade.
Recording and Submitting a Panopto Video for Assessment – How To
If you have not yet recorded and submitted a Panopto video for assessment purposes, please watch the video How to submit a student video assignment.
Marking Key
Criteria NOT DEMONSTRATED ? DEMONSTRATED
FUNCTIONAL REQUIREMENTS (15 Marks)
Run a search on available server access logs based on one (1), two (2) or three (3) field criteria inputs. 0 1 2 3
Apply any search to either all server access logs available in a directory or just one (1) specific log of the user’s choice. 0 1 2 3
Export the results of any search to a text file and destination directory of the user’s choosing. Where the file and/or destination directory nominated by the user are non-existent, your script will create them. 0 1 2
Any records in which the CLASS field is set to normal are to be automatically excluded from the search results printed to the screen 0 1
When the PACKETS and/or BYTES fields are used as search criteria, the user should be able to choose greater than (-gt), less than (-lt), equal to (-eq) or not equal to !(-eq) the specific value they provide. 0 1 2
When the PACKETS and/or BYTES fields are used as search criteria, totals for each of these should also be calculated and displayed as the final row of the search results printed to the screen 0 1 2
When the SRC IP or DEST IP fields are used as search criteria, the user should only need provide a partial search string rather than a complete value, e.g. search using the partial string EXT rather than the exact value EXT_SERVER 0 1 2
USABILITY, RELIABILITY AND EFFICIENCY REQUIREMENTS (10 Marks)
All string-based searches should be case insensitive. 0 0.5 1
The results of any search are to be printed to the screen in a columnar format, uniformly aligned and spaced. 0 0.5 1
All user inputs are to be fully validated and sanitised as required to ensure the correct execution of subsequent code. 0 0.5 1 1.5
The script is to display a high level of abstraction, .i.e. the hard-coding of values is to be avoided. 0 0.5 1 1.5
The efficiency of your code will also be considered, hence the degree of thought you apply to the selection of and interaction between shell script elements such as logical tests, control structures (if-elif-fi, loops, arrays), functions, command substitution, regular expressions, piping, redirection and utilities, e.g. awk, is important. 0 0.5 1 1.5
The user must be able to conduct as many search operations as they wish without the script terminating. Hence, the script must continue to run until the user specifically chooses to terminate it via a menu option. 0 0.5 1 1.5
All menus, options and prompts are to be easily understood and require minimal input from the user in response. 0 0.5 1
Sound code structure and full commenting will be examined by your tutor and factor into your grade. 0 0.5 1
ENHANCED FUNCTIONALITY (5 Marks)
Additional feature allows user to analyse log data in a useful and meaningful way that adds genuine value to the tool 0 0.5 1
Additional feature is efficiently coded and works as described in video 0 1 2 3
Additional feature integrates seamlessly with the default elements of the analysis tool. 0 1
EXPLAINER VIDEO (10 Marks)
Video begins with you appearing on-screen displaying your Student ID card and verbally stating your full name and student number. 0 0.5 1
A full run-through of your code demonstrating Functional Requirements 1 through 7 in action. 0 1 2
Explain how you have addressed Usability, Reliability and Efficiency Requirements 1 through 8, pointing to specific example(s) in the code and code output in each case. 0 1 2
Explain and demonstrate the Enhanced Functionality achieved by the one (1) additional feature you created that allows the user to work with the server access logs in a useful and meaningful way that adds genuine value to the analysis tool. 0 1 2
Change one element of code, e.g., such as a message displayed when invalid input is provided and then re-run the code to show the change in action. 0 0.5 1
If there was any Functional or Usability, Reliability and Efficiency requirements you were not able to implement then briefly explain the reasons why this was the case, e.g. ran out of time, couldn’t figure out the code required, etc. 0 0.5 1
Both the video and audio elements of your presentation should be of good quality. 0 0.5 1
TOTAL SCORE: /40
END OF ASSIGNMENT BRIEF

Looking for answers ?


Recent Questions