Ebu Yusuf Guven, Mehmet Yavuz Yağci, A. Boyacı, Serhan Yarkan, M. Aydin
{"title":"骨干攻击研究综述","authors":"Ebu Yusuf Guven, Mehmet Yavuz Yağci, A. Boyacı, Serhan Yarkan, M. Aydin","doi":"10.1109/ISDFS.2019.8757546","DOIUrl":null,"url":null,"abstract":"The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Survey on Backbone Attack\",\"authors\":\"Ebu Yusuf Guven, Mehmet Yavuz Yağci, A. Boyacı, Serhan Yarkan, M. Aydin\",\"doi\":\"10.1109/ISDFS.2019.8757546\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.\",\"PeriodicalId\":247412,\"journal\":{\"name\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2019.8757546\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757546","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.