2000
DOI: 10.1016/s0920-5489(00)00047-7
|View full text |Cite
|
Sign up to set email alerts
|

LAN security: problems and solutions for Ethernet networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…At the basis of a successful automatic methodology there lie proper models enabling 1) to provide an abstract, simplified but complete view of the system under validation (SUV), and 2) to define strategies for the automatic assessment of the SUV. Current literature is plenty of works allowing to formalize the behavior of parallel systems, mobile applications [23], wired [24] [2] and wireless [25] [9] networks and so on. The primary challenge with such modeling activities is to prove the provided abstraction is general but complete enough to support a comprehensive analysis of the system.…”
Section: Security Assessment Through Attack Graphmentioning
confidence: 99%
“…At the basis of a successful automatic methodology there lie proper models enabling 1) to provide an abstract, simplified but complete view of the system under validation (SUV), and 2) to define strategies for the automatic assessment of the SUV. Current literature is plenty of works allowing to formalize the behavior of parallel systems, mobile applications [23], wired [24] [2] and wireless [25] [9] networks and so on. The primary challenge with such modeling activities is to prove the provided abstraction is general but complete enough to support a comprehensive analysis of the system.…”
Section: Security Assessment Through Attack Graphmentioning
confidence: 99%
“…Since DHCP responses typically include default gateway and DNS server information, the network attacker can supply their own system as the default gateway and DNS server resulting in a manin-the-middle attack. [12] f) MAC spoofing -man in the middle attacks: MAC spoofing involves the use of a known MAC address of another host that is authorized to access the network. The attacker attempts to make the target switch forward frames destined for the actual host to the attacker device instead.…”
Section: Vulnerability Threat and Attacks On Layermentioning
confidence: 99%
“…In the study on the safety of Ethernet LANs [11], requirements were emphasized and to meet them, each node can only read packets addressed to it, verify the source of the data and accept the addressed package once. In another work [12], authors proposed a security hardware device model between the node and the network environment independent of the software to secure the Ethernet LANs.…”
Section: Introductionmentioning
confidence: 99%