Seminar on Internet Technologies (Winter 2015/2016): Difference between revisions

Line 88: Line 88:
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service,
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service,
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms.
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms.
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| -
|-
| '''Network Virtualization with SDN''' (Assigned to Marcus Khalil)
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| -
| -