Identify current or future security issues in sdn

Assignment Help Computer Network Security
Reference no: EM131061242

Purpose of the assessment:

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Description of the assessment:

Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a network's control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network.

This assignment includes four parts-

1. Literature review on Software Define Networking (SDN)

2. Identify three current or future security issues in SDN

3. Develop theoretical security framework against one of the identified security issues in (2)

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

1. Literature review on Software Define Networking (SDN)

You need to write 1000 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Identify three current or future security issues in SDN

In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references.

3. Develop theoretical security framework against one of the identified security issues in (2) In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and develop a theoretical security framework for this particular security issue.

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

You have to create a 7-10 minutes presentation to present your work in front of large audience

Submission guidelines:

1. Submit softcopy of the assignment report with signed coversheet.

2. Your report should include the following:
- The cover page must identify student (name and number), teaching staff, and assignment.
- The assignment must be written using IEEE conference template and should be no more than six (6) pages.

3. Power point slides no more than 12 slides.

Verified Expert

The paper is pre poo are on software defined network SDN.In this we have discussed about the designing of few SDNS and also the threats the organisations faces in the network system.We have provided few conclusions or suggestions for the threats

Reference no: EM131061242

Questions Cloud

Payday loans are very short-term loans : Payday loans are very short-term loans that charge very high interest rates. You can borrow $500 today and repay $580 in two weeks. What is the compounded annual rate implied by this 16 percent rate charged for only two weeks?
Declining growth stock valuation : Declining Growth Stock Valuation Brushy Mountain Mining Company's coal reserves are being depleted, so its sales are falling. Also, environmental costs increase each year, so its costs are rising. As a result, the company's earnings and dividends are..
Standard costing system and uses a flexible budget : Border Company employs a standard costing system and uses a flexible budget to predict overhead costs at various levels of activity. Calculate the variable overhead spending variance for the most recent year. If the variance is favorable, enter a cap..
Importance of globalisation and information technology : This is an assignment that should be done based on one of the any industry (like fast food or retail chain or so). The topic is importance of globalisation and information technology (including AIS) in modern business and its effectiveness in mana..
Identify current or future security issues in sdn : MN502: Network Security Identify three current or future security issues in SDN and develop theoretical security framework against one of the identified security issues
Beta of the new portfolio : You plan to use the proceeds to purchase another stock which has a beta equal to 0.9. What will be the beta of the new portfolio? Show your answer to 2 decimal places.
Estimate the number of actual trays required : A mixture of benzene and toluene containing 60 mole percent benzene is to be separated into an overhead product containing 96 mole percent benzene and a bottoms containing 25 mole percent benzene.
Interest rate earned on this deposit : If the bank returns $50 on a $1,000 deposit after one year, what is the interest rate earned on this deposit?
What percent of the maximum allowable flow rate is being use : what percent of the maximum allowable flow rate is being used

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd