COMPX515-22B (HAM)

Security for Advanced Networks

15 Points

Edit Header Content
Division of Health Engineering Computing & Science
School of Computing and Mathematical Sciences
Department of Computer Science

Staff

Edit Staff Content

Convenor(s)

Lecturer(s)

Administrator(s)

: buddhika.subasinghe@waikato.ac.nz

Placement/WIL Coordinator(s)

Tutor(s)

Student Representative(s)

Lab Technician(s)

Librarian(s)

: alistair.lamb@waikato.ac.nz

You can contact staff by:

  • Calling +64 7 838 4466 select option 1, then enter the extension.
  • Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
    • For extensions starting with 4: dial +64 7 838 extension.
    • For extensions starting with 5: dial +64 7 858 extension.
    • For extensions starting with 9: dial +64 7 837 extension.
    • For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Edit Staff Content

Paper Description

Edit Paper Description Content
Advanced network technologies, such as Software-Defined Networks (SDN) and the Internet of Things (IoT), are now part of the Internet. Exploiting related vulnerabilities, attackers may compromise confidentiality, integrity and/or availability of systems to harm human beings, businesses or governments. It is important to understand the most relevant attacks on the Internet and the state-of-the-art defences, including how novel Internet technologies work and the security challenges they create. The professional needs to be able to perform a critical assessment of attacks and approaches proposed to mitigate them. Besides strengthening the students' background, this paper prepares them to conduct research on the topic.

The learning outcomes for this paper are linked to Washington Accord graduate attributes WA1-WA11. Explanation of the graduate attributes can be found at: https://www.ieagreements.org/

Edit Paper Description Content

Paper Structure

Edit Paper Structure Content

The paper is organised into four parts. It begins with an overview of network security, revising Internet operation and security principles. The second part covers the state-of-the-art knowledge about four of the most important network security issues: IP prefix hijacking, vulnerability scanning, botnets, and DoS/DDoS. The third part is about recent network technology advances (IoT and SDN), the novel security challenges and opportunities they create. The last part, building on the previous three, uses active student participation and in-class discussions to connect research advances on network security with real-world applications.

The materials (slides, scientific articles to read, etc) will be available on Moodle.
Edit Paper Structure Content

Learning Outcomes

Edit Learning Outcomes Content

Students who successfully complete the paper should be able to:

  • Identify, formulate, research literature and analyse threats to Internet security, reaching substantiated conclusions using first principles (WA2)
    Linked to the following assessments:
  • Create, select and apply appropriate mitigation approaches to protect networks, with an understanding of the limitations (WA5)
    Linked to the following assessments:
  • Critically assess technical content on Internet security and identify what is relevant and accurate, enabling life-long learning (WA12)
    Linked to the following assessments:
  • Communicate effectively on complex Internet security issues, including how to write effective and technically correct reports and presentations (WA10)
    Linked to the following assessments:
Edit Learning Outcomes Content
Edit Learning Outcomes Content

Assessment

Edit Assessments Content
Students are expected to attend the two lectures each week, either physically or via Zoom, and engage using the Xorro system. The level of engagement is part of the assessment (10%). There are four self-paced quizzes to be completed, based on the materials presented in lectures and additional readings to be made by the student (40%). A written test will reflect those quizzes (20%). A major part of the assessment is the literature review document (20%) and its presentation (10%).

If you are enrolled in a BE(Hons), samples of your work may be required as part of the Engineering New Zealand accreditation process for BE(Hons) degrees. Any samples taken will have the student name and ID redacted. If you do not want samples of your work collected then please email the engineering administrator, Natalie Shaw (natalie.shaw@waikato.ac.nz), to opt out.
Edit Additional Assessment Information Content

Assessment Components

Edit Assessments Content

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.

Component DescriptionDue Date TimePercentage of overall markSubmission MethodCompulsory
1. Lecture participation
10
  • Other: Xorro, Moodle
  • In Class: In Lecture
2. Quizzes
40
  • Online: Submit through Moodle
3. Written Test
6 Oct 2022
No set time
20
  • Online: Submit through Moodle
4. Literature review document
20
  • Online: Submit through Moodle
5. Presentation
10
  • Online: Submit through Moodle
Assessment Total:     100    
Failing to complete a compulsory assessment component of a paper will result in an IC grade
Edit Assessments Content

Required and Recommended Readings

Edit Required Readings Content

Required Readings

Edit Required Readings Content
Readings are topical and based on scientific papers. The materials will be made available in moodle in advance for each lecture.
Edit Required Readings Content

Recommended Readings

Edit Recommended Readings Content
Complementary material, of topical nature, will be identified and made available to the students associated with each part of the paper.
Edit Recommended Readings Content

Online Support

Edit Online Support Content
Online support will be provided via Moodle. Forums will be created for students to ask questions and contribute ideas and topics. Alternative communication channels will be discussed with the class. Lectures will be recorded and made available via Panopto within 48h. Complementary video materials will be selected from YouTube. Real-time questions will be asked using the Xorro platform.
Edit Online Support Content

Workload

Edit Workload Content

Per week on average:

  • 2 hours: two 1-hour lectures
  • 5 hours: studying literature describing the state-of-the-art in the network security
  • 3 hours: answering quizzes
  • 2 hours: performing a literature review and preparing the corresponding write-up/presentation
Edit Workload Content

Linkages to Other Papers

Edit Linkages Content

Prerequisite(s)

Prerequisite papers: COMPX304 and 30 points of COMPX papers at 300 level

Corequisite(s)

Equivalent(s)

Restriction(s)

Edit Linkages Content