Assignment title: Information


MN502: Network Security 1/Overview of Network Security Assignment 2 (20%) MN502: Total 20 Marks Due Date: Friday of Week 11 Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. Description of the assessment: Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a network's control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network. This assignment includes four parts- 1. Literature review on Software Define Networking (SDN) 2. Identify three current or future security issues in SDN 3. Develop theoretical security framework against one of the identified security issues in (2) 4. Create a 7-10 minutes presentation and present your work in front of big audiences. 1. Literature review on Software Define Networking (SDN) You need to write 1000 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. 2. Identify three current or future security issues in SDN In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references. 3. Develop theoretical security framework against one of the identified security issues in (2) In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and develop a theoretical security framework for this particular security issue. 4. Create a 7-10 minutes presentation and present your work in front of big audiences. Trimester 1, 2016 BN203/MN502 Page 2 of 3 You have to create a 7-10 minutes presentation to present your work in front of large audience Submission guidelines: 1. Submit softcopy of the assignment report with signed coversheet. 2. Your report should include the following:  The cover page must identify student (name and number), teaching staff, and assignment.  The assignment must be written using IEEE conference template and should be no more than six (6) pages. 3. Power point slides no more than 12 slides. Extensions: Requests for an extension, accompanied by supporting documentation, must be received by the student in writing before 3 working days from the due date else penalties may apply for late submission without an approved extension. Special consideration form is available on level 8 reception. Penalties: Academic misconduct such as cheating and plagiarism may incur penalties ranging from a reduced result to program exclusion. BN203/MN502 Page 3 of 3 Marking Rubric for Assignment #: Total Marks Marker's Name: Mark Achieved: Excellent Good Unsatisfactory Introduction All topics are pertinent and Generally This is not relevant to the covered in depth. Ability to relevant and assignment topic. /5 think critically and source analysed. material is demonstrated Literature Review/6 Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Three (3) security Exceptional discussion on Two security Not related to the security threats vulnerabilities Security vulnerabilities for threats for the /6 the system. Identifying highly system or a sophisticated and well reasonable referenced vulnerabilities. discussion Advance discussion on threats Good discussion Not related to network security. Develop mitigation using latest on threats Theoretical technologies and procedures. mitigation using Security technologies and Framework/6 procedures. Summary/ Clear understanding and Basic Very little attempt to explain Demonstration confident demonstration with understanding all features, advantage and and /5 disadvantage. demonstration with all features, advantage and disadvantage of the tool Reference style /4 Clear styleswith excellent source of references. Generally good referencing style Lacks consistency with many errors Presentation Slides /4 Well organized and resourceful Well Organized but not resourceful Neither well organized not resourceful Oral Presentation Deliver the materials well, Deliver the Neither well delivered nor in front of Large Audience understands and materials well interacted Audience /4 interaction happen but no interaction with audience Poor writing -5 Plagiarism -40