MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "6a107763-4fd9-4105-8049-e0a2763e8caa"}, "_deposit": {"id": "4747", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4747"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4747", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To demonstrate the weakness of Layer 2 network, some attacking tools are discussed. Although paper strongly against malicious attacks and use prevention, detection and mitigation technique to the network, the best way to protect a network is to know how it can be attacked. Network communication in LAN can use peripherals hub, switch and bridge. Paper presented switch can provide about 90 percent of security features environment. The main purpose of paper is to discuss the mitigation of security attacks in Layer2/L2 switching by using practical examples so that easy to understand with scenarios. The final part of paper is configuration command-practice for hardening layer 2 security attacks and their mitigations."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "DHCP Starvation"}, {"interim": "ARP Poisoning"}, {"interim": "VLAN Hopping, STP"}, {"interim": "Layer2 Switching"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixteenth International Conferences on Computer Applications(ICCA 2018)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Su Su"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-02-22"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/482"}, "item_title": "Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004747", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "4747", "relation": {}, "relation_version_is_last": true, "title": ["Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks"], "weko_shared_id": -1}
Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks
http://hdl.handle.net/20.500.12678/0000004747
http://hdl.handle.net/20.500.12678/000000474780f7d154-2e8e-447d-b257-ceb82c77877d
6a107763-4fd9-4105-8049-e0a2763e8caa
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks | |||||
Language | en | |||||
Publication date | 2018-02-22 | |||||
Authors | ||||||
Win, Su Su | ||||||
Thwin, Mie Mie Su | ||||||
Description | ||||||
Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To demonstrate the weakness of Layer 2 network, some attacking tools are discussed. Although paper strongly against malicious attacks and use prevention, detection and mitigation technique to the network, the best way to protect a network is to know how it can be attacked. Network communication in LAN can use peripherals hub, switch and bridge. Paper presented switch can provide about 90 percent of security features environment. The main purpose of paper is to discuss the mitigation of security attacks in Layer2/L2 switching by using practical examples so that easy to understand with scenarios. The final part of paper is configuration command-practice for hardening layer 2 security attacks and their mitigations. | ||||||
Keywords | ||||||
DHCP Starvation, ARP Poisoning, VLAN Hopping, STP, Layer2 Switching | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/482 | |||||
Journal articles | ||||||
Sixteenth International Conferences on Computer Applications(ICCA 2018) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |