WEEK NO.: 9 | DATE: 10 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Non-confident entities interact by getting allowed by the Block chain. How SDN and Block chain intersect.
|
Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Block chain. | Method which we are used to improving the security is the SDN method or aggregation method. | Techniques are used to reduce malicious traffic or unwanted traffic from the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
Attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.
|
10 May 2021 | Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. | Yes |
Week-8
WEEK NO.: 8 | DATE: 2 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
How SDN and Blockchain converge is that non-confident actors communicate by being enabled by the Blockchain.
|
Going to implement traffic amplification and integration to reduce malicious traffic and protect Blockchain nodes.
|
The SDN tool, also known as aggregation, is one of the methods we use to improve protection.
|
Methodologies are used to eliminate network traffic that is malicious or unwanted.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The internet of things has been subjected to several assaults in recent years.
The unified control panel has a single point of failure.
|
2 May 2021s | The attacker will continue to insert traffic into Blockchain nodes to disrupt regular operations.
|
Yes |
Week-7
WEEK NO.: 7 | DATE: 27 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Non-confident entities interact by getting allowed by the Blockchain how SDN and Blockchain intersect.
|
Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Blockchain. | The method which we are used to improving the security is the SDN method or aggregation method. | Techniques are used to reduce malicious traffic or unwanted traffic from the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The attacker remains to inject traffic to make an impact on nodes of the Blockchain from the normal operations.
|
27 April 2021 | Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. | Yes |
Week-6
WEEK NO.: 6 | DATE: 17 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
SDN offers centralized control, due to which it is prone to be targeted by many attackers.
|
To mitigate the problem of fake IP addresses. | Traffic filtration method is used to analyse the operations of an IDS system and makes the operation in the normal state. | Software-defined networking is a suggested method for establishing the networking framework. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The target of the attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.
|
17 April 2021 | More and more devices are connected to the internet is increasing data communication and transmission. | Yes |
Week-5
WEEK NO.: 5 | DATE: 11 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
The BSDNFilter uses the whitelisting and blacklisting technique that is used to enhance the performance of the filtration.
|
With the application of the source verification process, the problems regarding fake IP addresses can be identified. | The generic framework is used in this to implement the SDN method. | The NetScan tool is used for the analysis or scanning of the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The lack of knowledge among people about blockchain technology leads to the contradiction.
|
11 April 2021 | The ChainGuard tackles the attempts of malicious connection by implementing the list technique. The DistBlockNet model has the purpose of reducing the duration of the attack. | Yes |
Week-4
WEEK NO.: 4 | DATE: 03 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Non-confident entities interact by getting allowed by the Block chain. How SDN and Block chain intersect.
|
Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Block chain. | Method which we are used to improving the security is the SDN method or aggregation method. | Techniques are used to reduce malicious traffic or unwanted traffic from the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
Attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.
|
03 April 2021 | Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. | Yes |
Week-3
WEEK NO.: 3 | 30th March 2020 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
The BSDN Filter can accomplish better performance of filtration against the attacks of flooding. | The newly developed blockchain’s and SDN have inspired to focus on SDN that is based on Blockchain and derive BSDN Filter | The evaluation is being done in an SDN environment that is based on real Blockchain | Authentic security mechanism for SDN by implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The challenges regarding security, efficiency, and scalability are prevalent while considering IoT as a tool for internet-enabled devices | 30th March 2020 | SDN may be prone to DoS threats causing the nodes of Blockchain to be unable to transmit or get any block information. | Yes |
Week -1
NAME: Taranjit Singh | |||
PROJECT TITLE: Distributed Software-Defined Network (SDN) controllers using Blockchain | |||
WEEK NO.: 2 | DATE:17 march 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
To study the connection of smart devices to the IoT with the help of Blockchain. | The use of Blockchain technology in the IoT devices with the help of the Software-Defined Network (SDN)
|
This week, proposed the solutions for the IoT devices security that users can access the systems for their uses.
The security of the data is done. |
The Blockchain technique and the IoT are mainly for solving the problems which are faced by the IoT devices. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
Blockchain is facing several problems such as cyber-attacks and security issues in the devices. The technology is facing network errors in IoT devices. | 17 march 2021 | Blockchain technology solves all the problems of software devices with the help of IoT. It also solves the problem of DoS attacks in the devices. | Yes |
Project brief, blog setup
My Name is Taranjit Singh my student ID is 11670566. I am from Punjab which is north part of India. I completed my graduation in Computer Science from RIMT University Mandi, Gobindgarh. Currently, I’m pursuing my master’s in information technology. My specialization is cloud computing and computer networking.
According to my specialization, the selected topic is “Distributed Software-Defined Network (SDN) controllers using Blockchain”. The newly developed blockchains and SDN have inspired to focus on SDN that is based on Blockchain and derive BSDN Filter, which is a security mechanism that works on IDS. By implementing traffic aggregation and fusion, it creates a filtration that is based on trust. It aims to tackle and decrease malicious traffic (Chaudhary et al., 2019). The evaluation is being done in an SDN environment that is based on real Blockchain. Furthermore, it depicts that the BSDN Filter can accomplish better performance of filtration against the attacks of flooding. The other approaches don’t give the same performance. It is being done through collaboration with an IT company. Therefore, considering the aforementioned problems, there is a lot of need to design the right mechanisms of security to test and handle the traffic. It leads to the development of the BSDN Filter, which is an authentic security mechanism for SDN by implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Blockchain (Aliyu et al., 2020).
Hello world!
Welcome to your brand new blog at CSU Thinkspace .
For Guides to getting started check out:
For support visit: http://thinkspace.csu.edu.au/support/.