Week-9

WEEK NO.: 9   DATE: 10 May 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
Non-confident entities interact by getting allowed by the Block chain. How SDN and Block chain intersect.

 

 

 

Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Block chain. Method which we are used to improving the security is the SDN method or aggregation method. Techniques are used to reduce malicious traffic or unwanted traffic from the network.
ISSUES
DESCRIPTION DATE RESULT FINISHED
Attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.

 

 

 

10 May 2021 Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. Yes

Week-8

WEEK NO.: 8   DATE: 2 May 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
How SDN and Blockchain converge is that non-confident actors communicate by being enabled by the Blockchain.

 

 

 

Going to implement traffic amplification and integration to reduce malicious traffic and protect Blockchain nodes.

 

The SDN tool, also known as aggregation, is one of the methods we use to improve protection.

 

Methodologies are used to eliminate network traffic that is malicious or unwanted.

 

ISSUES
DESCRIPTION DATE RESULT FINISHED
The internet of things has been subjected to several assaults in recent years.

The unified control panel has a single point of failure.

 

 

 

2 May 2021s The attacker will continue to insert traffic into Blockchain nodes to disrupt regular operations.

 

Yes

Week-7

WEEK NO.: 7   DATE: 27 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
Non-confident entities interact by getting allowed by the Blockchain how SDN and Blockchain intersect.

 

 

 

Implementing traffic by traffic aggregation and traffic fusion to decrease malicious traffic and safeguard the nodes of the Blockchain. The method which we are used to improving the security is the SDN method or aggregation method. Techniques are used to reduce malicious traffic or unwanted traffic from the network.
ISSUES
DESCRIPTION DATE RESULT FINISHED
The attacker remains to inject traffic to make an impact on nodes of the Blockchain from the normal operations.

 

 

 

27 April 2021 Many attacks have happened to the internet of things nowadays. A single point of failure occurs in the centralized control panel. Yes

Week-6

WEEK NO.: 6   DATE: 17 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
SDN offers centralized control, due to which it is prone to be targeted by many attackers.

 

 

 

To mitigate the problem of fake IP addresses. Traffic filtration method is used to analyse the operations of an IDS system and makes the operation in the normal state. Software-defined networking is a suggested method for establishing the networking framework.
ISSUES
DESCRIPTION DATE RESULT FINISHED
The target of the attacker remains on injecting traffic to make an impact on nodes of the Block chain from the normal operations.

 

 

17 April 2021 More and more devices are connected to the internet is increasing data communication and transmission. Yes

Week-5

WEEK NO.: 5   DATE: 11 April 2021
 
PLANNING  
MILESTONE: PLANNED ACTUAL COMMENT
The BSDNFilter uses the whitelisting and blacklisting technique that is used to enhance the performance of the filtration.

 

 

 

With the application of the source verification process, the problems regarding fake IP addresses can be identified. The generic framework is used in this to implement the SDN method. The NetScan tool is used for the analysis or scanning of the network.
ISSUES
DESCRIPTION DATE RESULT FINISHED
The lack of knowledge among people about blockchain technology leads to the contradiction.

 

 

11 April 2021 The ChainGuard tackles the attempts of malicious connection by implementing the list technique. The DistBlockNet model has the purpose of reducing the duration of the attack. Yes
Step 1 of 2
Please sign in first
You are on your way to create a site.