Identify current or future security issues in sdn

Assignment Help Computer Network Security
Reference no: EM131061242

Purpose of the assessment:

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Description of the assessment:

Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a network's control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network.

This assignment includes four parts-

1. Literature review on Software Define Networking (SDN)

2. Identify three current or future security issues in SDN

3. Develop theoretical security framework against one of the identified security issues in (2)

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

1. Literature review on Software Define Networking (SDN)

You need to write 1000 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Identify three current or future security issues in SDN

In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references.

3. Develop theoretical security framework against one of the identified security issues in (2) In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and develop a theoretical security framework for this particular security issue.

4. Create a 7-10 minutes presentation and present your work in front of big audiences.

You have to create a 7-10 minutes presentation to present your work in front of large audience

Submission guidelines:

1. Submit softcopy of the assignment report with signed coversheet.

2. Your report should include the following:
- The cover page must identify student (name and number), teaching staff, and assignment.
- The assignment must be written using IEEE conference template and should be no more than six (6) pages.

3. Power point slides no more than 12 slides.

Verified Expert

The paper is pre poo are on software defined network SDN.In this we have discussed about the designing of few SDNS and also the threats the organisations faces in the network system.We have provided few conclusions or suggestions for the threats

Reference no: EM131061242

Questions Cloud

Payday loans are very short-term loans : Payday loans are very short-term loans that charge very high interest rates. You can borrow $500 today and repay $580 in two weeks. What is the compounded annual rate implied by this 16 percent rate charged for only two weeks?
Declining growth stock valuation : Declining Growth Stock Valuation Brushy Mountain Mining Company's coal reserves are being depleted, so its sales are falling. Also, environmental costs increase each year, so its costs are rising. As a result, the company's earnings and dividends are..
Standard costing system and uses a flexible budget : Border Company employs a standard costing system and uses a flexible budget to predict overhead costs at various levels of activity. Calculate the variable overhead spending variance for the most recent year. If the variance is favorable, enter a cap..
Importance of globalisation and information technology : This is an assignment that should be done based on one of the any industry (like fast food or retail chain or so). The topic is importance of globalisation and information technology (including AIS) in modern business and its effectiveness in mana..
Identify current or future security issues in sdn : MN502: Network Security Identify three current or future security issues in SDN and develop theoretical security framework against one of the identified security issues
Beta of the new portfolio : You plan to use the proceeds to purchase another stock which has a beta equal to 0.9. What will be the beta of the new portfolio? Show your answer to 2 decimal places.
Estimate the number of actual trays required : A mixture of benzene and toluene containing 60 mole percent benzene is to be separated into an overhead product containing 96 mole percent benzene and a bottoms containing 25 mole percent benzene.
Interest rate earned on this deposit : If the bank returns $50 on a $1,000 deposit after one year, what is the interest rate earned on this deposit?
What percent of the maximum allowable flow rate is being use : what percent of the maximum allowable flow rate is being used

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

  How will ids and passwords be properly maintained?

How will IDs and passwords be properly maintained?

  Write about computer security affects you at school

Write about computer security affects YOU at school and in your personal life. You may be surprised at how many things you do that depend on some aspects of secure computer records and communications, like banking, grades, e-mail, timesheets, libr..

  How can sender and receiver establish new shared secret key

Suppose that the sender and re­ ceiver have never met, but there exists a trusted third party that shares a secret key with the sender and also shares a (different) secret key with the receiver. How can the sender and receiver establish a new shar..

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment.

  Write a program for recursive algorithm

Consider the following recursive algorithm

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Identify all potential security threats on personal computer

Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system

  Develop its own mib for managing a product line

Suppose you worked for a Canadian base company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered?

  What is relationship between hashing and digital signatures

PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP.

  Poor cybersecurity policy can disrupt business continuity

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

  What is the guaranteed quality of coursework

What is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd