0% found this document useful (0 votes)
154 views3 pages

Project: Milestone - 1

It provides a description of the network security wherein I have reviewed various papers of different researchers.

Uploaded by

Ankush Dhiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views3 pages

Project: Milestone - 1

It provides a description of the network security wherein I have reviewed various papers of different researchers.

Uploaded by

Ankush Dhiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Page |1

PROJECT
Milestone – 1
Page |2

1 PROJECT TITLE

“Survey On Network Security Using Software-Defined Networking”

2 INTRODUCTION

2.1 Overview

In today's network environment, it is vital to keep the network safe as the volume of attacks
is continually increasing and becoming more sophisticated and/or distributed. If we look
over the threats, they are numerous and even may target several services (for instance –
Gaming, Video Streaming, P2P, Banking Services, Social Networks, Remote Shells, or Email)
on heterogeneous devices (for instance – Cars, TV Screens, Mobile Phones, Or Computers,
etc). In light of this, such issues have been researched for decades.

In recent years, Software Defined Networking (SDN) emerged and rapidly gained traction
by enabling the programmability of networks and facilitating the deployment of new
services and functionalities. In this paper, I will review the various approaches of SDN in
implementing network security functions (for instance – Middlebix deployment, Network
Monitoring, or Access Control). (McKeown et al., 2008) In particular, most of such
approaches depend on OpenFlow, which was initially proposed in 2008 and is receiving
strong community interest.

2.2 STEP – 1: Main Problem

The problem statement of the study is – “How to utilize the SDN (Software-Defined
Networking) approach in studying Network Security”.

2.3 STEP – 2: Approach to Solve the Problem

In this paper, I will review the various approaches of SDN in implementing network security
functions (for instance – Middlebix deployment, Network Monitoring, or Access Control).
Page |3

2.4 Aim And Objectives

AIM – The study aims to survey network security using the SDN approach.

Objectives – Various objectives are as follows:

a) Exploring the concept of OpenFlow as well as SDN.


b) Studying the concept of enabling Simple Access Policies with SDN.
c) Exploring the concept of networking monitoring along with more advanced
techniques on network security.
d) Summarize the entire study that I will review in.

3 STEP – 3: ACCESSING THW QUALITY OF STUDIES

If we consider the quality of the study, it is quite good as every aspect has been attempted
to explain in this paper. The paper starts with the background details wherein the author
described the explanation of the besic terms and later included the technical details. In
this paper, the researcher reviewed all the advanced techniques related to network
securities and also reviews how can be attained if one intends to employ the network
securities in the infrastructure.

You might also like