POST 1: Introduction to Session 3 and Session 4
Hello Everyone!
Welcome everyone to the world of SDN Applications.
Through Sessions 3 and 4 we shall have a look at Distributed Controllers and why it is the right way to deploy SDNs in the real world today!
We shall also look at network security issues in SDNs and how to address them.
Specifically, we shall be dealing with DDoS and DoS attacks, how they compromise the SDN hosts and controllers, and how to tackle this situation through the centralized controller information and also through machine learning.
We request all of you to satisfy few prerequisites for Sessions 3 and 4 as mentioned in the next post.
Thank You
Happy Networking!
Welcome everyone to the world of SDN Applications.
Through Sessions 3 and 4 we shall have a look at Distributed Controllers and why it is the right way to deploy SDNs in the real world today!
We shall also look at network security issues in SDNs and how to address them.
Specifically, we shall be dealing with DDoS and DoS attacks, how they compromise the SDN hosts and controllers, and how to tackle this situation through the centralized controller information and also through machine learning.
We request all of you to satisfy few prerequisites for Sessions 3 and 4 as mentioned in the next post.
Thank You
Happy Networking!
Comments
Post a Comment