WEEK NO.: 9 | DATE: 10 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Non-confident entities interact by getting allowed by the Block chain. How SDN and Block chain intersect.
|
Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Block chain. | Method which we are used to improving the security is the SDN method or aggregation method. | Techniques are used to reduce malicious traffic or unwanted traffic from the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
Attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.
|
10 May 2021 | Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. | Yes |
Month: May 2021
Week-8
WEEK NO.: 8 | DATE: 2 May 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
How SDN and Blockchain converge is that non-confident actors communicate by being enabled by the Blockchain.
|
Going to implement traffic amplification and integration to reduce malicious traffic and protect Blockchain nodes.
|
The SDN tool, also known as aggregation, is one of the methods we use to improve protection.
|
Methodologies are used to eliminate network traffic that is malicious or unwanted.
|
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The internet of things has been subjected to several assaults in recent years.
The unified control panel has a single point of failure.
|
2 May 2021s | The attacker will continue to insert traffic into Blockchain nodes to disrupt regular operations.
|
Yes |
Week-7
WEEK NO.: 7 | DATE: 27 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
Non-confident entities interact by getting allowed by the Blockchain how SDN and Blockchain intersect.
|
Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Blockchain. | The method which we are used to improving the security is the SDN method or aggregation method. | Techniques are used to reduce malicious traffic or unwanted traffic from the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The attacker remains to inject traffic to make an impact on nodes of the Blockchain from the normal operations.
|
27 April 2021 | Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. | Yes |
Week-6
WEEK NO.: 6 | DATE: 17 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
SDN offers centralized control, due to which it is prone to be targeted by many attackers.
|
To mitigate the problem of fake IP addresses. | Traffic filtration method is used to analyse the operations of an IDS system and makes the operation in the normal state. | Software-defined networking is a suggested method for establishing the networking framework. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The target of the attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.
|
17 April 2021 | More and more devices are connected to the internet is increasing data communication and transmission. | Yes |
Week-5
WEEK NO.: 5 | DATE: 11 April 2021 | ||
PLANNING | |||
MILESTONE: | PLANNED | ACTUAL | COMMENT |
The BSDNFilter uses the whitelisting and blacklisting technique that is used to enhance the performance of the filtration.
|
With the application of the source verification process, the problems regarding fake IP addresses can be identified. | The generic framework is used in this to implement the SDN method. | The NetScan tool is used for the analysis or scanning of the network. |
ISSUES | |||
DESCRIPTION | DATE | RESULT | FINISHED |
The lack of knowledge among people about blockchain technology leads to the contradiction.
|
11 April 2021 | The ChainGuard tackles the attempts of malicious connection by implementing the list technique. The DistBlockNet model has the purpose of reducing the duration of the attack. | Yes |