2016
DOI: 10.1504/ijcnds.2016.10000954
|View full text |Cite
|
Sign up to set email alerts
|

Critical analysis of layer 2 network security in virtualised environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…However, due to the amount of tasks and transactions performed over the internet today it is necessary to protect each actively. Bull and Matthews (2016) explores the attacks to the network that occur on layer 2 in a completely virtualized environment as it develops in this article. The researchers did several tests and identified vulnerabilities in the physical machines that are very similar to the vulnerabilities in their virtualized practices.…”
Section: Discussionmentioning
confidence: 99%
“…However, due to the amount of tasks and transactions performed over the internet today it is necessary to protect each actively. Bull and Matthews (2016) explores the attacks to the network that occur on layer 2 in a completely virtualized environment as it develops in this article. The researchers did several tests and identified vulnerabilities in the physical machines that are very similar to the vulnerabilities in their virtualized practices.…”
Section: Discussionmentioning
confidence: 99%