COMPX515-23B (HAM)
Security for Advanced Networks
15 Points
Staff
Convenor(s)
Marinho Pilla Barcellos
G.1.05
marinho.pillabarcellos@waikato.ac.nz
|
Administrator(s)
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
- For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
What this paper is about
Advanced network technologies, such as Software-Defined Networks (SDN) and the Internet of Things (IoT), are now part of the Internet. Exploiting related vulnerabilities, attackers may compromise confidentiality, integrity and/or availability of systems to harm human beings, businesses or governments. It is important to understand the most relevant attacks on the Internet and the state-of-the-art defences, including how novel Internet technologies work and the security challenges they create. The professional needs to be able to perform a critical assessment of attacks and comparison of approaches proposed to mitigate them. Besides strengthening the students' background, this paper prepares them to conduct research on the topic of network security.
How this paper will be taught
This is a discussion-driven, synchronously taught paper. Students are expected to attend the two lectures each week (note that this is not a NET paper). When it is not possible to attend in person, the student will be able to participate via Zoom. In both cases, student participation will be recorded using the Xorro system.
The paper is organised into four parts. It begins with an overview of network security, revising Internet operation and security principles. The second part covers state-of-the-art knowledge about four of the most important network security issues: prefix hijacking, vulnerability scanning, botnets, and Distributed Denial-of-Service (DDoS). The third part is about recent network technology advances (Internet of Things - IoT and Software-Defined Networks - SDN), and the novel security challenges and opportunities they create. The last part, building on the previous three, uses active student participation and in-class discussions via seminars to connect research advances on network security with real-world applications.
Required Readings
Learning Outcomes
Students who successfully complete the course should be able to:
Assessments
How you will be assessed
Students are expected to attend the two lectures each week. Student participation will be recorded/measured using the Xorro system, and the level of engagement is part of the assessment (12 marks).
There are four self-paced quizzes to be completed, based on the materials presented in lectures and additional readings to be made by the student (34 marks).
A written test, to be answered on Moodle, will test students' knowledge (20 marks). It will reflect the quizzes.
A major part of the assessment is the literature review document (20 marks) and its presentation (10 marks). The remaining marks (4 marks) are for active participation during the seminars.
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam.