ssessment item 5 back to top Research project (Report) Value: 20% Due Date: 21-Sep-2018 Return Date: 16-Oct-2018 Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative...

1 answer below »

ssessment item 5



back to top


Research project (Report)


Value:20%Due Date:21-Sep-2018Return Date:16-Oct-2018Length:1500-2000 words (Excluding references)Submission method options:Alternative submission method

Task



back to top


In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:



  • Overview of the topic

  • Relevant technologies and applications of those technologies

  • Highlighting the challenges/problems in your chosen research area

  • Identification of any gaps in the literature by:

    • discussing areas/issues that you believe have been addressed in the current literature;

    • highlighting areas/issues that have not been addressed or adequately addressed; and

    • discussing your view(s) on the issue(s) that you see as being critical.



  • Summarize the future research directions based on the identified research gaps


To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing aminimumof 7 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Science Direct etc. Please note Wikipedia and general blogs will not be considered as acceptable citations.


Your report should include the following sections. A template will also be made available in the Resources section of your subject Interact2 site.




Abstract (As submitted for Assessment 3)


Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important.


Keywords


Three to seven keywords representing the main content of the report.


Introduction


The Introduction section should explain the background to the report, its aims, a summary of relevant existing literature and the issue/issues under discussion.


Main text


This should contain the body of the report, and should be broken into appropriate subsections with short, informative headings and sub-headings.


Conclusions


This should clearly mention the main conclusions and include an explanation of their relevance or importance to the field.


References

List the references used in your research.

Rationale



back to top


This assessment task will assess the following learning outcome/s:



  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

  • be able to explain the fundamental concepts of cryptographic algorithms.

  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.

  • be able to investigate and justify the use of the access control mechanisms and user authentication processes.

  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.


This assessment continues from/links back toAssessment 3where students initiated their research project by selecting a research topic in an emerging area of information security.The aim of this task is to help students :



  • to demonstrate ability to integrate and apply information from various topics;

  • to build an understanding and perspective of current and emerging topics in Information Security;

  • to help the students to formulate their research project in a step by step manner; and

  • to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security


Marking criteria and standards



back to top









































































Assessment criteria



Assessable Components


HD100% - 85%DI84% - 75%CR74% - 65%PS64% - 50%FL49% - 0

Abstract


(5 Marks)


A very concise abstract where the aim of study is perfectly articulated, the central question is precisely formulated,A concise abstract where the aim of study is appropriately articulated, the research question is formulated.A concise abstract where the aim of study is relatively articulated, the research question is adequately formulated.A concise abstract where the aim of study is articulated, the research question is vaguely formulated.Incomplete abstract with no research question identified.

Introduction and background


(3 Marks)


A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included.A thorough discussion in relation to the significance as well as the aim/objectives of research is included.An adequate discussion in relation to the significance as well as the aim/objectives of research is includedAn incomplete or irrelevant discussion is included.

Selects literature (at leastsevenreferences) that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research)


(2 Marks)


Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).


High quality references.

Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).


High quality references.

Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research).


Good quality references.

Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).


Mix of good and poor quality references.

Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).


Poor quality references.


Identifies gaps in the literature.


(4 Marks)


Comprehensive knowledge of the topic and in depth explanation of the issues that are not addressed;Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed.Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed.Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed.

Fails to satisfy minimum requirements of explaining the issues.



Comments on future research directions based on the identified gaps i.e what other research questions arise from the literature.


(4 Marks)


The proposed future research direction is well formulated and ably answers all the identified gaps.
The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps.
The proposed future research direction is adequately formulated and answers some of the identified gaps.
The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps.
The proposed future research direction is not adequately formulated and does not sufficiently answer the identified gaps

Written clearly (with content well organized)


(1 Marks)


Highly developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Formal English is used throughout.
Well developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Mostly uses formal English.
Good skills in expression & clear presentation of ideas.
Mostly fluent writing style appropriate to assessment task/document type.
Grammar & spelling contains a few minor errors. More or less uses formal English.
Some skills in expression & presentation of ideas.
Meaning apparent, but writing style not always fluent or well organised.
Grammar & spelling contains several careless errors. Hardly uses formal English
Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.
Grammar & spelling contains many errors. Does not use formal English.

Provides references using APA referencing system including in-text citations.


(1 Marks)


Faultlessreferencing,includingreference list and in text citations.

Very goodreferencing,includingreference list andin text citations.Good referencing,includingreference list andin text citations.Evidence ofrudimentaryreferencing skills.Sub-standardreferencing.

Presentation



back to top


Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced).


APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link:http://student.csu.edu.au/study/referencing-at-csu


Requirements



back to top


Please note:AssessmentMUSTbe submitted asONEMS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances willnotbe made for any loss of information, diagrams or images as a result of the re-formatting.


All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced.


A cover page must be includedand should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).



Answered Same DaySep 14, 2020ITC595Charles Sturt University

Answer To: ssessment item 5 back to top Research project (Report) Value: 20% Due Date: 21-Sep-2018 Return Date:...

Ankit answered on Sep 18 2020
144 Votes

                    
Student_Id: 11673434
                Student_name: CHINNAM SHIVA SAI KRISHNA
                Security issues in Software Defined Networks (SDN)
Abstract
The networking strategy in which information planes and controls required for network are decoupled is known as SDN (Software defined network). The major benefit of utilizing SDN over other traditional systems are offering adaptability. In a coherent way, the centralization of states and system knowledge is directed for application reflection in network framework. The security of network is being upgraded by SDN by making system states all-inclusive noticeable in which any happened struggle is resolved with mid-ware planes which are legitimately maintained. In this way, the design of SDN allows the implemented system for danger determination and movement observing with addition and adjustment in security arrangements. SDN usage predominantly incorporates; network effectiveness, arrangement of quick administrations, and adaptability of implemented network in least pricing. The furthermore provided advantages of SDN are manageability, configurability and programmability. In SDN, the information planes and related controls are isolated which drives some security challenges like saturation threats, DoS threats, and man in middle threats and so forth.
In entire paper, the security dangers caused to information planes, controls and relate
d utilizations of SDN will be examined. We will also focus about the security stages and methodologies which can be utilized to protect the SDN. The suggestions of ITU-T as security measurements are for the most part used to examine the security solution for SDN. The occurred security difficulties of present time to SDN and in near future will be featured in my entire paper.
Keyword
Software defined network, SDN, SDN implementation, SDN security, SDN system, DoS
Introduction
Software Defined Networks (SDN) is an innovative technology that has gotten a lot of awareness because it offers more adaptability than traditional network. It is the decoupling of the information plane from the control plane. (Sultana)
The evident unbending nature and absence of adaptability and programmability of heritage network design is the main concern of various networking systems throughout the years. The proposed answer for the present problem of the true system design is SDN. In the SDN the information plane is isolated from the control plane, and network control can be midway controlled. The isolation of data and control planes give rise to security threats such as man-in-the middle threats, DoS threats, or other threats. The document focuses on security vulnerability to information planes, control plane and related utilizations of SDN. We will also focus about the security stages and methodologies which can be utilized to protect the SDN. The suggestions of ITU-T as security measurements are for the most part used to examine the security solution for SDN. The occurred security difficulties of present time to SDN and in near future will be featured in my entire paper.
Technology used in SDN
The control plane and data plane in conventional or old network exist on every gadget whereas SDN summarizes the idea and isolates the data and control planes. To include adaptability, the control plane is put straightforwardly on a SDN controller that is a Linux server running SDN programming and Data plane is situated on a physical or virtual switch. The SDN controller turns into a basic segment that advises controllers how to move information parcels. The two planes can transfer data through a protocol, for example, OpenFlow. (Asturia 2017)
Security Threats in SDN Data Plane
SDN is viewed as a standout amongst the most encouraging models for the cutting edge PC systems. The communication among the control and information plane empower top programmability, they likewise open the entryway for hackers to dispatch new assaults against OpenFlow systems. Hackers from the information plane caused high attacks to SDN. The various threats to SDN consist of DoS threats, topology poison threats and side channel threats as discussed below:
DoS threats: The control and information planes assets is attacked by denial of service threats in which hackers block the transfer speed of switch controller, over-burden flow table of switch and memory and expend controller CPU and memory by flooding table-miss parcels.
Topology poisoning threats: The worldwide network perspective of the control plane is harmed by hackers such as network topology harming threats. By producing or transferring
LLDP (Link Layer Discovery Protocol), hackers will produce non-existent connections between switches. (Gao)
Side-channel attacks: Hackers will take in the detail of network arrangements. This type of threats examines the sum of postpone inserted to timing pings that are exceptionally created to deduce the network setups and control application design. (Gao)
Security platforms and approaches to secure SDN data plane
· AvantGuard creates a TCP proxy on the information plane in order to prevent DoS threats which works as an addition to authenticate the authorized of TCP handshakes.
· Besides FloodGuard which act as a protocol independent barrier framework, locates proactive flow guidelines in order to limit table-miss parcels and advances table miss parcels to an extra information plane cache.
· To lessen the cost of equipment alterations, FloodDefender shifts table-miss parcels to adjoining controls. This will filter out threat traffic with two-phase filtering.
· TopoGuard recognizes the kind of associated gadget in topology poisoning threats that powerfully examines the updates.
· the side-channel attacks are prevented by “normalizing the control plane delay to a configurable default responding time” (Gao)
Security Threats in SDN control Plane and approaches
The different type of security threats in SDN control plane as listed below:
Network Manipulation: A basic threat that happens on the control plane. Hacker understands the SDN controller, delivers false network information and starts different threats on the whole network system. (Asturia 2017)
Approaches to secure SDN control plane: The controller of SDN ought to have redundant element and the correspondence channels ought to be secured utilizing solid encryption.
DoS threats: The control and information planes assets is attacked by denial of service threats in which hackers block the transfer speed of switch controller. This is very common threat which cause all segments of SDN.
Approaches to secure SDN control plane: the strategies such as speed limiting and packet dropping is used.
Security Threats in SDN Application Plane and approaches
The different type of security threats in SDN application plane as listed below:
App manipulation: This type of threat happens in the application plane. An attack of application exploit could cause breakdown, interruption of applications, or listen in of information. The hacker ought to obtain entrance with high benefit to a SDN application and do unauthorized tasks.
The most effective method to protect or secure SDN is to make networks or servers refreshed with most recent patches.
API exploitation: The APIs of a product part may consist of threats that can enable an attacker to play out an unapproved divulgence of data. Programming interface misuse can likewise occur at every part and can prompt the annihilation of system streams.
The most effective method to protect or secure SDN is to make networks or servers refreshed with most recent patches.
Recommendations of ITU-T as security dimensions and security solution to SDN
The security dimensions from ITU-T are recommended in order to address every part of network security system. The security recommendations comprise of group of safety techniques to secure them from various security vulnerabilities. The security platforms and techniques are explained as per ITU-T recommended security dimensions. The security solutions are proposed for each security dimensions as listed below:
a) Access control security dimension: The access control security dimension guarantee that just verified individuals or gadgets may use the network assets. Unapproved access to the controller or an application server which records client certifications might do destruction over the network. The security solution or mechanism used is impose access control on OF apps and enables access control policy enforcement framework. There is need of access controls for application plane and various controllers.
b) Authentication security dimension: Authentication security dimension guarantee the characters of the conveying communities and that a client or gadget isn't endeavouring a disguise or unapproved action of past interchanges. The application server in SDN requires to validate gadgets and clients before giving data like client characters or certifications. The security solution or mechanism used is there is need of role based authentication and authorization. It also used controls authentication policies.
c) Privacy dimension: Privacy dimension guarantee assurance of data which may be gotten from examining the network tasks. TLS (Transport Layer Security) is determined for the OpenFlow correspondence that is a typical methodology for empowering secure transforming in customer/server apps on the network. The security solution or mechanism used is traffic isolation based privacy and user selected security policies.
Future directions
SDN upgrades security of network because of worldwide vision of the network state, incorporated insight and network programmability. “All things considered, a typical distribution layer gathering data about security necessities of various things, assets and vendors that spread the security setting up directions to the system components to authorize security arrangements can result in powerful and versatile security authorization. Be that as it may, a similar key property of SDN i.e., centralized intelligence and programmable network elements, make security in SDN a more challenging task. Hence, many potential SDN security solutions and platforms are proposed that are described above.”
There are some future directions and research challenges that need to understand properly as listed below:
a) Programming designs: SDN empowers designers in creating real network systems or models, conventions, applications, and check or verify it in working networks. This ability helps them to acquire new techniques in networking system yet can likewise present security challenges with the horde of conceivable new applications running in a system. The freedom and free interconnection of different advancement conditions and discretionary control stages which may convey the methodologies of autonomous apps on conceivably a similar sending components ought to make extreme privacy issues.
b) Adaptability and Security: Adaptability is the real difficulties looked by the intelligently unified SDN engineering. As the growth of network in SDN furthermore, distance across develops, the measure of control activity ordained towards the brought together controller increments and subsequently the stream setup time develops. In addition, it is realized that the capacity what's more, task set of an OpenFlow controller is in all probability constrained. Subsequently, the absence of versatility in SDN can empower focused on assaults by immersing correspondence between the controller and the switch to impact control plane saturation. (Ylianttila)
Conclusion
Software Defined Networks (SDN) is an innovative technology that has gotten a lot of awareness because it offers more adaptability than traditional network. It is the decoupling of the information plane from the control plane. The control plane and data plane in conventional or old network exist on every gadget whereas SDN summarizes the idea and isolates the data and control planes. To include adaptability, the control plane is put straightforwardly on a SDN controller that is a Linux server running SDN programming and Data plane is situated on a physical or virtual switch. Hackers from the data plane, control and application plane caused high attacks to SDN so different approaches are suggested to secure the network. For example, AvantGuard creates a TCP proxy on the information plane in order to prevent DoS threats which works as an addition to authenticate the authorized of TCP handshakes. The security dimensions from ITU-T are recommended in order to address every part of network security system. The security recommendations comprise of group of safety techniques to secure them from various security vulnerabilities. The security platforms and techniques are explained as per ITU-T recommended security dimensions. SDN upgrades security of network because of worldwide vision of the network state, incorporated insight and network programmability. Some future directions and research challenges that need to understand properly such as programming designs, adaptability and Security, class based app security etc.

References
1. Asturia, D (March 21,2017), 9 types of software defined network attacks and how to protect them, Retrieved on September 17,2018, Retrieved https://www.routerfreak.com/9-types-software-defined-network-attacks-protect/
2. Gao, S. Security threats in the data plane of software defined networks, Retrieved on September 17,2018, Retrieved from http://www4.comp.polyu.edu.hk/~csbxiao/paper/2018/SDNattacks-network18.pdf
3. Sultana, A. Software defined Networks Security, Retrieved on September 17,2018, Retrieved from https://pdfs.semanticscholar.org/82bf/13030007e0055a67d0dd5fccbc48fa9bd855.pdf
4. Ylianttila, M, security in software defined networks, Retrieved on September 17,2018, Retrieved from http://www.iuvmtech.com/wp-content/uploads/2017/02/Security-in-Software.pdf
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here