COMPX515-21B (HAM)

Security for Advanced Networks

15 Points

Edit Header Content
Division of Health Engineering Computing & Science
School of Computing and Mathematical Sciences
Department of Computer Science

Staff

Edit Staff Content

Convenor(s)

Lecturer(s)

Administrator(s)

Placement/WIL Coordinator(s)

Tutor(s)

Student Representative(s)

Lab Technician(s)

Librarian(s)

: alistair.lamb@waikato.ac.nz

You can contact staff by:

  • Calling +64 7 838 4466 select option 1, then enter the extension.
  • Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
    • For extensions starting with 4: dial +64 7 838 extension.
    • For extensions starting with 5: dial +64 7 858 extension.
    • For extensions starting with 9: dial +64 7 837 extension.
    • For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Edit Staff Content

Paper Description

Edit Paper Description Content

Advanced network technologies, such as Software-Defined Networks (SDN) and the Internet of Things (IoT), are a reality. Exploiting vulnerabilities in such networks and on the Internet at large, attackers may compromise confidentiality, integrity and/or availability of systems to harm human beings, businesses or governments. Consequences include loss of human lives, of financial assets, and of user privacy. Thus it is crucial to understand how these novel technologies work, be aware of the security challenges they create, and be able to perform critical assessment of approaches proposed to protect them. Besides strengthening the students' background, this paper prepares them to conduct research in the topic.

Edit Paper Description Content

Paper Structure

Edit Paper Structure Content

The paper begins with an overview and introduction to the latest developments in network technology. The rest of the paper is organised in 5 parts of equal size (two weeks), each covering one specific type of network. The parts cover core concepts about the corresponding network technology and discuss security issues for that specific type of network, based on the state-of-the-art.

  • Internet of Things (IoT)
  • Information-Centric Networks (CCN or ICN)
  • Software-Defined Networks (SDN)
  • Programmable dataplane networks (P4)
  • Network Function Virtualisation (NFV)

The materials (slides, scientific articles to read, etc) will be available on Moodle.

Edit Paper Structure Content

Learning Outcomes

Edit Learning Outcomes Content

Students who successfully complete the paper should be able to:

  • Enumerate the advances in computer networks in the last decade
    Linked to the following assessments:
  • Understand the core principles behind the most relevant types of advanced networks
    Linked to the following assessments:
  • Discuss main threats to security of advanced networks and the impact of attacks to them
    Linked to the following assessments:
  • Discuss security principles and how they could be applied to protect such networks
    Linked to the following assessments:
  • Understand the relevance of technical quality in security-related materials and apply it to selection of reliable sources
    Linked to the following assessments:
  • Identify open areas of research in network security
    Linked to the following assessments:
Edit Learning Outcomes Content
Edit Learning Outcomes Content

Assessment

Edit Assessments Content

As the name implies, the in-lecture quizzes (12 points) can only be answered during the lectures.

Students are expected to physically attend the two lectures each week. When this is not possible, the student can participate via Zoom (should be prepared to contribute to the lecture by audio and/or chat).

Edit Additional Assessment Information Content

Assessment Components

Edit Assessments Content

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.

Component DescriptionDue Date TimePercentage of overall markSubmission MethodCompulsory
1. In-lecture Quizzes
12
  • Other: Xorro
  • In Class: In Lecture
2. Self-paced Quizzes
24
  • Online: Submit through Moodle
3. Literature review document
30
  • Online: Submit through Moodle
4. Written Test
34
  • Online: Submit through Moodle
Assessment Total:     100    
Failing to complete a compulsory assessment component of a paper will result in an IC grade
Edit Assessments Content

Required and Recommended Readings

Edit Required Readings Content

Required Readings

Edit Required Readings Content
Readings are topical and based on scientific papers. The materials will be made available in moodle in advance for each lecture.
Edit Required Readings Content

Recommended Readings

Edit Recommended Readings Content
Complementary material, of topical nature, will be identified and made available to the students associated with each part of the paper.
Edit Recommended Readings Content

Online Support

Edit Online Support Content
Online support will be provided via Moodle. Forums will be created for students to ask questions and contribute ideas and topics. Alternative communication channels will be discussed with the class. Lectures will be recorded and made available via Panopto. Complementary video materials will be selected from YouTube. Real-time questions will be asked using Moodle, or a platform like Xorro or Slido.
Edit Online Support Content

Workload

Edit Workload Content

Per week on average:

  • 2 hours: two 1-hour lectures
  • 5 hours: studying literature describing the state-of-the-art in the network security
  • 3 hours: answering quizzes
  • 2 hours: performing literature review and preparing corresponding write-up
Edit Workload Content

Linkages to Other Papers

Edit Linkages Content

Prerequisite(s)

Prerequisite papers: COMPX304 and 30 points of COMPX papers at 300 level

Corequisite(s)

Equivalent(s)

Restriction(s)

Edit Linkages Content