Identify three current or future security issues in sdn

Assignment Help Computer Networking
Reference no: EM131504098

Assessment -Security Issues

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a network's control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network.

This assignment includes four parts

1. Literature review on Software Defined Networking (SDN).

2. Identify three current or future security issues in SDN.

3. Propose a possible solution for one of the threats identified in section (2).

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

1. Literature review on Software Defined Networking (SDN)
You need to write 800 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Identify three current or future security issues in SDN
In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references.

3. Propose a possible solution for one of the threats identified in section (2). In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and propose a possible solution to this particular security issue.

4. Create a 7-10 minutes presentation and present your work in front of big audiences. You have to create a 7-10 minutes presentation to present your work in front of large audience.

Verified Expert

The paper is pre poo are on software defined network SDN.In this we have discussed about the designing of few SDNS and also the threats the organisations faces in the network system.We have provided few conclusions or suggestions for the threats

Reference no: EM131504098

Questions Cloud

What is the synoptic problem : What is the "synoptic problem"? Which solution to the synoptic problem do you think is the best and why?
A bandwagon approach to convince readers : In what part of the argument does Griffin make use of a bandwagon approach to convince readers of the validity of his claim? Explain.
Create your dss spreadsheet utilizing the given steps : Create your DSS spreadsheet utilizing the following steps: In Row 1, create a header row with the following labels in bold font and Column A: Vendor Name
Name eight virtues of chivalry : Name 8 virtues of chivalry and explain the importance of each one(Faith, courage, courtesy, franchise, loyalty, prowess, honesty, generosity).
Identify three current or future security issues in sdn : MN502 - Overview of Network Security Literature review on Software Defined Networking (SDN) and Identify three current or future security issues in SDN.
What is social interaction : What is social interaction? What are the elements of social structures? How does this apply to the activity you just completed?
What do you do when people on your team are not pulling : How would you define leadership? As a leader, what do you do when people on your team aren't pulling their weight?
Members help maintain a project schedule : What are some of the causes for schedule delay? How can project team members help maintain a project's schedule?
Organizations operating on mechanistic assumptions : Using the Internet, point out two examples of organizations operating on mechanistic assumptions and two examples of organizations where leaders operate.

Reviews

inf1504098

6/16/2017 3:15:51 AM

Work is past my desires and finished way ahead of schedule. Certainly suggest and would utilize once more. Fabulous paper. Unquestionably would ask everybody to prescribe Expertsmind. Thanks

len1504098

5/22/2017 8:28:14 AM

Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Reference style /4 Clear styles with excellent source of references. Clear referencing style Presentation slides /4 Well organised and resourceful Organised and resourceful Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction

len1504098

5/22/2017 8:28:08 AM

Grade Mark HD 32-40 Excellent Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Literature Review /6 Finding is clearly linked and well justified Three Security Vulnerabilities /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures

len1504098

5/22/2017 8:28:01 AM

Section to be included in the report Description of the section Marks Introduction Introduction of Software Defined Networks 5 Literature Review Literature review of Software Defined Networks 6 Three security vulnerabilities Discuss three security vulnerabilities of Software Defined Networks 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 4 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4

len1504098

5/22/2017 8:27:43 AM

The assignment should be written in IEEE conference format. and make assignment according to the marking criteria and put 5 reference according to the IEEE referencing style. words limit should be 900.And read the assignment description. No presentation require for assignment.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd