Editor, Bureaucrats, Administrators
990
edits
(→Topics) |
(→Topics) |
||
Line 88: | Line 88: | ||
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service, | The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service, | ||
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms. | little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms. | ||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | |||
| - | |||
|- | |||
| '''Network Virtualization with SDN''' (Assigned to Marcus Khalil) | |||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | | [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | ||
| - | | - |