13th Australian Information Security Management Conference 2015
DOI: 10.4225/75/57b69e28d938f
|View full text |Cite
|
Sign up to set email alerts
|

Innovating additional Layer 2 security requirements for a protected stack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…However, this layer is responsible for logical addressing, framing of data, network topology, and access. Notification of errors and flow control [16].…”
Section: Transport Layermentioning
confidence: 99%
“…However, this layer is responsible for logical addressing, framing of data, network topology, and access. Notification of errors and flow control [16].…”
Section: Transport Layermentioning
confidence: 99%
“…Layer 2 can cause major downtime (Mehra & Krishnan, 2018). layer 2 attack requires a high level of intelligence and good knowledge of what is going on in the communication actions (Cusack & Lutui, 2015) mostly attack from internal organization. Commonly internal network is a trusted one, attacking from an internal like traitor in the army and giving deep impact on it.…”
Section: Introductionmentioning
confidence: 99%