Identify current or future security issues in sdn

Assignment Help Computer Network Security
Reference no: EM131061242

Purpose of the assessment:

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Description of the assessment:

Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a network's control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network.

This assignment includes four parts-

1. Literature review on Software Define Networking (SDN)

2. Identify three current or future security issues in SDN

3. Develop theoretical security framework against one of the identified security issues in (2)

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

1. Literature review on Software Define Networking (SDN)

You need to write 1000 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Identify three current or future security issues in SDN

In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references.

3. Develop theoretical security framework against one of the identified security issues in (2) In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and develop a theoretical security framework for this particular security issue.

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

You have to create a 7-10 minutes presentation to present your work in front of large audience

Submission guidelines:

1. Submit softcopy of the assignment report with signed coversheet.

2. Your report should include the following:
- The cover page must identify student (name and number), teaching staff, and assignment.
- The assignment must be written using IEEE conference template and should be no more than six (6) pages.

3. Power point slides no more than 12 slides.

Verified Expert

The paper is pre poo are on software defined network SDN.In this we have discussed about the designing of few SDNS and also the threats the organisations faces in the network system.We have provided few conclusions or suggestions for the threats

Reference no: EM131061242

Questions Cloud

Payday loans are very short-term loans : Payday loans are very short-term loans that charge very high interest rates. You can borrow $500 today and repay $580 in two weeks. What is the compounded annual rate implied by this 16 percent rate charged for only two weeks?
Declining growth stock valuation : Declining Growth Stock Valuation Brushy Mountain Mining Company's coal reserves are being depleted, so its sales are falling. Also, environmental costs increase each year, so its costs are rising. As a result, the company's earnings and dividends are..
Standard costing system and uses a flexible budget : Border Company employs a standard costing system and uses a flexible budget to predict overhead costs at various levels of activity. Calculate the variable overhead spending variance for the most recent year. If the variance is favorable, enter a cap..
Importance of globalisation and information technology : This is an assignment that should be done based on one of the any industry (like fast food or retail chain or so). The topic is importance of globalisation and information technology (including AIS) in modern business and its effectiveness in mana..
Identify current or future security issues in sdn : MN502: Network Security Identify three current or future security issues in SDN and develop theoretical security framework against one of the identified security issues
Beta of the new portfolio : You plan to use the proceeds to purchase another stock which has a beta equal to 0.9. What will be the beta of the new portfolio? Show your answer to 2 decimal places.
Estimate the number of actual trays required : A mixture of benzene and toluene containing 60 mole percent benzene is to be separated into an overhead product containing 96 mole percent benzene and a bottoms containing 25 mole percent benzene.
Interest rate earned on this deposit : If the bank returns $50 on a $1,000 deposit after one year, what is the interest rate earned on this deposit?
What percent of the maximum allowable flow rate is being use : what percent of the maximum allowable flow rate is being used

Reviews

Write a Review

Computer Network Security Questions & Answers

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  What category information is collected by the site

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.

  How does defense in depth help prevent attacks?

How does defense in depth help prevent attacks?

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  How the virus was able to replicate onto remote servers

Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Describes how malicious code can get on your company

Which statement best describes the advantages of public key encryption?

  Identify the erroneous bit in the given message

One simple technique combines row-based(character) parity with column-based (longitudinal) parity to help detect and correct single-bit errors.

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd