{"title":"校园交换机安全与威胁缓解的实证研究","authors":"Mooraka Sandhya","doi":"10.1109/ICCCI56745.2023.10128280","DOIUrl":null,"url":null,"abstract":"The OSI seven-layer model has emerged as a global consensus for safely and confident organizational network communication while preventing other OSI layers from being familiar with the existing layer of communication. The application, transport, and network layers have all seen extensive research and development into solving network threats. The maintenance of Layer 2 threat mitigation is still insufficient. Unfortunately, this means that communications can be affected if one layer is broken without the other layers being aware of the issue. The entire network may be vulnerable if a first attack originates at Layer 2. The port security function must be set up correctly in order to work well in an organizational setting; otherwise, it may rapidly become more of a burden than a benefit. All assaults and defense strategies rely on an IP-enabled switched Ethernet network. Most of these attacks become considerably easier if shared Ethernet access (WLAN, Hub, etc.) is implemented. This paper summarizes various potential Layer 2 attacks while keeping an eye on security issues in Layer 2. VLAN hopping, MAC flooding, DHCP attacks are just a few examples of the network security issues caused by inadequate layer 2 hardening that are covered in this paper. Additionally, it addresses how this increases a LAN’s or network system’s susceptibility to attacks in general. How to set up switch efficiently to mitigate the attacks will be demonstrated.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Empirical investigations on the security and threat mitigation of campus switches\",\"authors\":\"Mooraka Sandhya\",\"doi\":\"10.1109/ICCCI56745.2023.10128280\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The OSI seven-layer model has emerged as a global consensus for safely and confident organizational network communication while preventing other OSI layers from being familiar with the existing layer of communication. The application, transport, and network layers have all seen extensive research and development into solving network threats. The maintenance of Layer 2 threat mitigation is still insufficient. Unfortunately, this means that communications can be affected if one layer is broken without the other layers being aware of the issue. The entire network may be vulnerable if a first attack originates at Layer 2. The port security function must be set up correctly in order to work well in an organizational setting; otherwise, it may rapidly become more of a burden than a benefit. All assaults and defense strategies rely on an IP-enabled switched Ethernet network. Most of these attacks become considerably easier if shared Ethernet access (WLAN, Hub, etc.) is implemented. This paper summarizes various potential Layer 2 attacks while keeping an eye on security issues in Layer 2. VLAN hopping, MAC flooding, DHCP attacks are just a few examples of the network security issues caused by inadequate layer 2 hardening that are covered in this paper. Additionally, it addresses how this increases a LAN’s or network system’s susceptibility to attacks in general. How to set up switch efficiently to mitigate the attacks will be demonstrated.\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128280\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128280","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Empirical investigations on the security and threat mitigation of campus switches
The OSI seven-layer model has emerged as a global consensus for safely and confident organizational network communication while preventing other OSI layers from being familiar with the existing layer of communication. The application, transport, and network layers have all seen extensive research and development into solving network threats. The maintenance of Layer 2 threat mitigation is still insufficient. Unfortunately, this means that communications can be affected if one layer is broken without the other layers being aware of the issue. The entire network may be vulnerable if a first attack originates at Layer 2. The port security function must be set up correctly in order to work well in an organizational setting; otherwise, it may rapidly become more of a burden than a benefit. All assaults and defense strategies rely on an IP-enabled switched Ethernet network. Most of these attacks become considerably easier if shared Ethernet access (WLAN, Hub, etc.) is implemented. This paper summarizes various potential Layer 2 attacks while keeping an eye on security issues in Layer 2. VLAN hopping, MAC flooding, DHCP attacks are just a few examples of the network security issues caused by inadequate layer 2 hardening that are covered in this paper. Additionally, it addresses how this increases a LAN’s or network system’s susceptibility to attacks in general. How to set up switch efficiently to mitigate the attacks will be demonstrated.