Assignment title: Information
MN502: Network Security 1/Overview of Network Security
Assignment 2 (20%)
MN502: Total 20 Marks
Due Date: Friday of Week 11
Assignment Overview
Purpose of the assessment:
The purpose of this assignment is to develop skills to independently think of innovation. In this
assignment students will first learn how to develop knowledge based on current state of the art of an
emerging knowledge domain. Then they will learn how to identify plausible security issues in this
emerging technology and finally learn the skill of adding knowledge to existing domain by
theoretically developing the corresponding protection mechanism for a particular issue.
Description of the assessment:
Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to
centralize software logically in order to control the behaviour of the network. In contrast to
conventional network, in SDN, a network's control logic is separated from the underlying physical
routers and switches. This phenomenon allows network operators to write high-level control
programs to specifying the behaviour of the whole network.
This assignment includes four parts-
1. Literature review on Software Define Networking (SDN)
2. Identify three current or future security issues in SDN
3. Develop theoretical security framework against one of the identified security issues in (2)
4. Create a 7-10 minutes presentation and present your work in front of big audiences.
1. Literature review on Software Define Networking (SDN)
You need to write 1000 word literature on SDN. Your literature should be supported by at least
three (3) academic (Journal/Conference) papers chosen from the current state of the art.
2. Identify three current or future security issues in SDN
In this section you will identify three security issues. These issues can be taken from current state
of the art or could be evolved from your own independent innovative thinking. This section
again must have to be supported by at least two (2) references.
3. Develop theoretical security framework against one of the identified security issues in (2)
In this part you need to add knowledge to the existing knowledge domain of SDN. You need to
choose one of the issues identified in previous section and develop a theoretical security
framework for this particular security issue.
4. Create a 7-10 minutes presentation and present your work in front of big audiences.
Trimester 1, 2016BN203/MN502 Page 2 of 3
You have to create a 7-10 minutes presentation to present your work in front of large audience
Submission guidelines:
1. Submit softcopy of the assignment report with signed coversheet.
2. Your report should include the following:
The cover page must identify student (name and number), teaching staff, and assignment.
The assignment must be written using IEEE conference template and should be no more
than six (6) pages.
3. Power point slides no more than 12 slides.
Extensions: Requests for an extension, accompanied by supporting documentation, must be
received by the student in writing before 3 working days from the due date else penalties may
apply for late submission without an approved extension. Special consideration form is available
on level 8 reception.
Penalties: Academic misconduct such as cheating and plagiarism may incur penalties
ranging from a reduced result to program exclusion.BN203/MN502 Page 3 of 3
Marking Rubric for Assignment #: Total Marks
Marker's Name: Mark Achieved:
Excellent Good Unsatisfactory
Introduction All topics are pertinent and Generally This is not relevant to the
covered in depth. Ability to relevant and assignment topic.
/5 think critically and source analysed.
material is demonstrated
Literature
Review/6
Finding is clearly linked and
justified
Finding is linked
and convincing
Finding is not linked and
unjustified
Three (3) security Exceptional discussion on Two security Not related to the security threats
vulnerabilities Security vulnerabilities for threats for the
/6 the system. Identifying highly system or a
sophisticated and well reasonable
referenced vulnerabilities. discussion
Advance discussion on threats Good discussion Not related to network security.
Develop mitigation using latest on threats
Theoretical technologies and procedures. mitigation using
Security technologies and
Framework/6 procedures.
Summary/ Clear understanding and Basic Very little attempt to explain
Demonstration confident demonstration with understanding
all features, advantage and and
/5 disadvantage. demonstration
with all features,
advantage and
disadvantage of
the tool
Reference style
/4
Clear styleswith excellent
source of references.
Generally good
referencing style
Lacks consistency with many
errors
Presentation Slides
/4
Well organized and resourceful Well Organized
but not
resourceful
Neither well organized not
resourceful
Oral Presentation Deliver the materials well, Deliver the Neither well delivered nor
in front of Large Audience understands and materials well interacted
Audience /4 interaction happen but no
interaction with
audience
Poor writing -5
Plagiarism -40