UCSY's Research Repository

Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks

Show simple item record

dc.contributor.author Win, Su Su
dc.contributor.author Thwin, Mie Mie Su
dc.date.accessioned 2019-07-04T06:31:31Z
dc.date.available 2019-07-04T06:31:31Z
dc.date.issued 2018-02-22
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/482
dc.description.abstract Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To demonstrate the weakness of Layer 2 network, some attacking tools are discussed. Although paper strongly against malicious attacks and use prevention, detection and mitigation technique to the network, the best way to protect a network is to know how it can be attacked. Network communication in LAN can use peripherals hub, switch and bridge. Paper presented switch can provide about 90 percent of security features environment. The main purpose of paper is to discuss the mitigation of security attacks in Layer2/L2 switching by using practical examples so that easy to understand with scenarios. The final part of paper is configuration command-practice for hardening layer 2 security attacks and their mitigations. en_US
dc.language.iso en en_US
dc.publisher Sixteenth International Conferences on Computer Applications(ICCA 2018) en_US
dc.subject DHCP Starvation en_US
dc.subject ARP Poisoning en_US
dc.subject VLAN Hopping, STP en_US
dc.subject Layer2 Switching en_US
dc.title Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


My Account