
COMPX515-21B (HAM)
Security for Advanced Networks
15 Points
Staff
Convenor(s)
Marinho Pilla Barcellos
G.1.05
marinho.pillabarcellos@waikato.ac.nz
|
|
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
- For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Paper Description
Advanced network technologies, such as Software-Defined Networks (SDN) and the Internet of Things (IoT), are a reality. Exploiting vulnerabilities in such networks and on the Internet at large, attackers may compromise confidentiality, integrity and/or availability of systems to harm human beings, businesses or governments. Consequences include loss of human lives, of financial assets, and of user privacy. Thus it is crucial to understand how these novel technologies work, be aware of the security challenges they create, and be able to perform critical assessment of approaches proposed to protect them. Besides strengthening the students' background, this paper prepares them to conduct research in the topic.
Paper Structure
The paper begins with an overview and introduction to the latest developments in network technology. The rest of the paper is organised in 5 parts of equal size (two weeks), each covering one specific type of network. The parts cover core concepts about the corresponding network technology and discuss security issues for that specific type of network, based on the state-of-the-art.
- Internet of Things (IoT)
- Information-Centric Networks (CCN or ICN)
- Software-Defined Networks (SDN)
- Programmable dataplane networks (P4)
- Network Function Virtualisation (NFV)
The materials (slides, scientific articles to read, etc) will be available on Moodle.
Learning Outcomes
Students who successfully complete the paper should be able to:
Assessment
As the name implies, the in-lecture quizzes (12 points) can only be answered during the lectures.
Students are expected to physically attend the two lectures each week. When this is not possible, the student can participate via Zoom (should be prepared to contribute to the lecture by audio and/or chat).
Assessment Components
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam.
Required and Recommended Readings
Required Readings
Recommended Readings
Online Support
Workload
Per week on average:
- 2 hours: two 1-hour lectures
- 5 hours: studying literature describing the state-of-the-art in the network security
- 3 hours: answering quizzes
- 2 hours: performing literature review and preparing corresponding write-up
Linkages to Other Papers
Prerequisite(s)
Prerequisite papers: COMPX304 and 30 points of COMPX papers at 300 level