{"title":"Analysis of Network Attacks at Data Link Layer and its Mitigation","authors":"Ravi Shanker, Aman Singh","doi":"10.1109/ICCS54944.2021.00061","DOIUrl":null,"url":null,"abstract":"Various packet capturing tools are available to capture packets in the form of datasets and several well-known datasets available now a day for benchmarking the network attacks for intrusion detection system and attracted the researchers to further analyse these attacks for future attacks also. These datasets contain several parameters that can be utilized for identification of attack at cross layers. Here the cross layer refers the data link layer, network layer, transport layer and application layer. These datasets can be used in research for identification and automation of novel attack. This paper concentrates on the attack types and classification of network attacks on data link layer. Post analysis will investigate the possibility of using Snort as intrusion detection tool for identifying attack at data link layer. Snort generally works at network layer and above so not all data link layer attack can be identified by IDS. For the current work a various solution already researched will be put together to analyse attack at data link layer with the help of Snort. This analysis will help in understanding the possibility to put together various attack at data link layer using Snort or provide already suggested solution done by various researcher.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing Sciences (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS54944.2021.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Various packet capturing tools are available to capture packets in the form of datasets and several well-known datasets available now a day for benchmarking the network attacks for intrusion detection system and attracted the researchers to further analyse these attacks for future attacks also. These datasets contain several parameters that can be utilized for identification of attack at cross layers. Here the cross layer refers the data link layer, network layer, transport layer and application layer. These datasets can be used in research for identification and automation of novel attack. This paper concentrates on the attack types and classification of network attacks on data link layer. Post analysis will investigate the possibility of using Snort as intrusion detection tool for identifying attack at data link layer. Snort generally works at network layer and above so not all data link layer attack can be identified by IDS. For the current work a various solution already researched will be put together to analyse attack at data link layer with the help of Snort. This analysis will help in understanding the possibility to put together various attack at data link layer using Snort or provide already suggested solution done by various researcher.