Font Size: a A A

Analysis And Research On Layer2Switching Security Risk

Posted on:2013-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:H CaiFull Text:PDF
GTID:2248330374479793Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With wide range of applications of the Internet in daily life, people are increasingly dependent on the network, the network has begun to fundamentally change the way of people’s life. Internet almost is the tool used by us every day, but with the deep of Internet applications, once the network is attacked and can not get proper treatment in time, will cause huge economic losses. The Internet is a huge open system, there are many shortcomings in its own design and implementation of the agreement, the new network attacks continue to emerge. And bigger deficiency, in the study of network attacks, most scholars only focus on the high-level security of network applications, while ignoring the network underlying protocol, equipment and other security risks. And compared to other network security threats such as network intrusion, virus, the attacks to the security risks of the second layer switching, which affect a wider range, attack faster and have more destructive. According to the target type of the second layer switching attack, can be divided into two categories:1) no purpose of the second layer switching attacks; these attacks have more influence on the second layer switch.2) have the purpose of the second layer switching attacks, which aim to the terminal server or computer. Since these attacks have representative in the second layer exchange, so this paper made a thorough research about these two types of attacks.In order to effectively monitor and prevent these attacks, before the design and the establishment of safe and robust network monitoring system, you must understand very clearly the mechanism of these attacks, behavior model and its mode of attack. Only a detailed analysis of the principles of attack can you build an effective monitoring model, and then according to the monitoring model, we design the monitoring systems. And when designing a monitoring and prevention systems against the second layer switching attack, then only understand the inner working mechanisms of these attacks, can effectively evaluate the effectiveness of this monitoring system or prevention system. Therefore, this paper firstly analyzed the security risks of the second layer switch and the working mechanisms against these security risks, for different attack methods, described their respective attacks model. And made deeper study for aggressive behavior, methods and other features; analyzed the damage to the network and operation in case of the network attacked by the second layer switch.Secondly, this paper analyzed the characteristics of the security risk of the second layer switch, and designed a variety of attack models:switch poisoned, misleading data frame, spanning tree attacks, and a lot of simulated attack experiments. Through statistical analysis of experimental data, and found out the common characteristics of these attacks. In addition, according to the attack mechanism against the second layer exchange, this paper presented a monitoring model based on the second layer switching safety, achieving to monitor the aggressive behavior. According to the model proposed,made project implementation, and made verification of the monitoring model, and achieved good results.
Keywords/Search Tags:The second layer switching, Security risks, Denial of service, Switch poisoning, Misleading data frame, Monitoring model
PDF Full Text Request
Related items