Question: Could you write in a document format step by step showing what you did and even the script for printing tide value every 5 s
Could you write in a document format step by step showing what you did and even the script for printing tide value every s not just explaining Could you also show every step from question to ie how to configure on monitor vm how to configure IDS, how to perform the attack and how to implement the additional secuirty control. You are required to use the following three V Ms provided to you in Azure.
Client VM
Server VM
Monitor VM
Configure your environment based on the following requirements:
Client VM Requirements
The purpose of this VM is to act as a MQTT Publisher to publish tide values to the MQTT Broker
Based on the scenario provided above, determine a tide range. Hint: use high and low tide
values that are reasonable based on the tide data from tideforecast.com website
The publish topic must be porttide
Do not use authentication.
Create a script to publish the tide values every seconds.
Server VM Requirements
The purpose of this VM is to act as the MQTT Broker as well as the MQTT Subscriber.
Ensure the MQTT Broker is configured to provide the required functionality for the MQTT
Publisher Client VM
Monitor VM Requirements
The purpose of this VM is to investigate the traffic between the Client VM and Server VM
Note: This VM on Azure is already configured to be on promiscuous mode to detect network
traffic in the subnet. If you are using your own environment, ensure you have configured your
virtual machines appropriately.
Configure the IDS to alert if any MQTT traffic is from other sources except the Server VM and client vm
You are required to complete the following tasks and submit in the form of a video recording.
Give an introduction of yourself and overview of your setup. You can give an overview of the setup
by showing each VM explaining its purpose, and displaying its IP address.
Show evidence that the MQTT Broker service is running and conjured as required in the above
requirements.
Show evidence that the MQTT Publisher is publishing the tide values using the required script.
Additionally, run the MQTT subscriber command on the MQTT Broker and show that the tide
values are being received as expected. Keep the publisher and subscriber running for the rest of
the tasks.
Capture network traffic from the Monitor VM Identify and explain the publish and subscribe
traffic. Your explanation should include: TCPIP handshake, the source and destination
information, ports, protocols, and MQTT payload.
Perform an FDI attack on the MQTT broker using the Host machine. You are required to inject an
outofrange tide value to the MQTT broker. Verify from the MQTT Broker to check whether the
attack was successful. Was the attack successful? Explain the outcome.
Did the IDS alert this attack? Explain the outcome.
Implement authentication on the MQTT Broker and MQTT Publisher.
Note: You do not need to record when you are making these configuration changes, however, you
need to show the relevant configuration files to show that you have implemented authentication.
Repeat the FDI attack again assume the attacker does not have valid credentials Was the attack
successful? Explain the outcome.
Implement one additional security control to further strengthen the security of the MQTT Broker.
Justify your solution.Assessment Case Study Pag
You are required to complete the following tasks and submit in the form of a video recording.
Give an introduction of yourself and overview of of the setup
by showing each VM explaining its purpose, and displaying its IP address.
Show evidence that the MQTT Broker service is running and conjured as required in the above
requirements.
Show evidence that the MQTT Publisher is publishing the tide values using the required script.
Additionally, run the MQTT subscriber command on the MQTT Broker and show that the tide
values are being received as expected. Keep the publisher and subscriber running for the rest of
the tasks.
Capture network traffic from the Monitor VM Identify and explain the publish and subscribe
traffic. Your explanation should include: TCPIP handshake, the source and destination
information, ports, protocols, and MQTT payload.
Perform an FDI attack on the MQTT broker using the Host machine. You are required to inject an
outofrange tide value to the MQTT broker. Verify from the MQTT Broker to check whether the
attack was successful. Was the attack successful? Explain the outcome.
Did the IDS alert this attack? Explain the outcome.
Implement authentication on the MQTT Broker and MQTT Publisher.
Note: You do not need to record when you are making these configuration changes, however, you
need to show the relevant configuration files to show that you have implemented authentication.
Repeat the FDI attack again assume the attacker does not have valid credentials Was the attack
successful? Explain the outcome.
Implement one additional security control. Show how step by step
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
