메뉴 건너뛰기




Volumn 15, Issue 3, 2013, Pages 1477-1491

A survey of ethernet LAN security

Author keywords

Data security; Ethernet networks; Security

Indexed keywords

ACADEMIC COMMUNITY; ADDRESS RESOLUTION PROTOCOL; DATA CENTERS; ETHERNET NETWORKS; MALWARE ATTACKS; SECURITY; SECURITY ASPECTS; THREE CATEGORIES;

EID: 84881317767     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2012.121112.00190     Document Type: Review
Times cited : (65)

References (82)
  • 1
    • 84883528987 scopus 로고    scopus 로고
    • W32.Stuxnet dossier
    • retrieved Oct 24, 2011 Online
    • N. Falliere, L. Murchu, and E. Chien, "W32.Stuxnet dossier." Symantec Security Response, 2010, retrieved Oct 24, 2011 Online: http://www.symantec.com/content/en/us/enterprise/media/security response/whitepapers/w32 stuxnet dossier.pdf.
    • Symantec Security Response, 2010
    • Falliere, N.1    Murchu, L.2    Chien, E.3
  • 3
    • 0016973732 scopus 로고
    • Ethernet: Distributed packet switching for local computer networks
    • July
    • R. Metcalfe and D. Boggs, "Ethernet: Distributed packet switching for local computer networks," Communications of the ACM, vol. 19, no. 7, pp. 395-404, July 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 395-404
    • Metcalfe, R.1    Boggs, D.2
  • 4
    • 70449371498 scopus 로고    scopus 로고
    • A survey of advanced ethernet forwarding approaches
    • R. Sofia, "A survey of advanced ethernet forwarding approaches," IEEE Commun. Surveys Tuts., vol. 11, no. 1, pp. 92-115, 2009.
    • (2009) IEEE Commun. Surveys Tuts. , vol.11 , Issue.1 , pp. 92-115
    • Sofia, R.1
  • 5
    • 0024904842 scopus 로고
    • Survey of commercially available secure LAN products
    • Fifth Annu Comput Secur Appl Conf
    • G. King, "A survey of commercially available secure LAN products," in Computer Security Applications Conference, 1989., Fifth Annual, 1989, pp. 239-247. (Pubitemid 20700755)
    • (1989) Annual Computer Security Applications Conference , pp. 239-247
    • King Greg1
  • 6
    • 84881310440 scopus 로고
    • Encapsulation security protocol design for local area networks
    • Local Area Network Security, ser T. Berson and T. Beth, Eds. Springer Berlin Heidelberg ch. chapter 10
    • R. Housley, "Encapsulation security protocol design for local area networks," in Local Area Network Security, ser. Lecture Notes in Computer Science, T. Berson and T. Beth, Eds. Springer Berlin Heidelberg, 1989, vol. 396, ch. chapter 10, pp. 103-109.
    • (1989) Lecture Notes in Computer Science , vol.396 , pp. 103-109
    • Housley, R.1
  • 7
    • 0026820373 scopus 로고
    • Design of a physical layer security mechanism for CSMA/CD networks
    • Feb
    • F. Poon and M. Iqbal, "Design of a physical layer security mechanism for CSMA/CD networks," Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, pp. 103-112, Feb 1992.
    • (1992) Communications, Speech and Vision, IEE Proceedings i , vol.139 , Issue.1 , pp. 103-112
    • Poon, F.1    Iqbal, M.2
  • 14
    • 84881315126 scopus 로고    scopus 로고
    • Vulnerability analysis and defence for the internet, ser
    • Springer US
    • A. Singh, B. Singh, and H. Joseph, Vulnerability Analysis and Defence for the Internet, ser. Advances in Information Security. Springer US, 2008, vol. 37.
    • (2008) Advances in Information Security , vol.37
    • Singh, A.1    Singh, B.2    Joseph, H.3
  • 22
    • 0003817787 scopus 로고
    • Ethernet address resolution protocol: Or converting network protocol addresses to 48.bit ethernet address for transmission on ethernet hardware
    • Nov. updated by RFCs 5227, 5494
    • D. Plummer, "Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware," RFC 826 (Standard), Internet Engineering Task Force, Nov. 1982, updated by RFCs 5227, 5494.
    • (1982) RFC 826 (Standard), Internet Engineering Task Force
    • Plummer, D.1
  • 25
    • 84881317617 scopus 로고    scopus 로고
    • Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) control
    • Aug. updated by RFC 6344
    • E. Mannie and D. Papadimitriou, "Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) Control," RFC 4606 (Proposed Standard), Internet Engineering Task Force, Aug. 2006, updated by RFC 6344.
    • (2006) RFC 4606 (Proposed Standard), Internet Engineering Task Force
    • Mannie, E.1    Papadimitriou, D.2
  • 26
    • 0003914088 scopus 로고    scopus 로고
    • Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast
    • Aug.
    • H. Holbrook, B. Cain, and B. Haberman, "Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast," RFC 4604 (Proposed Standard), Internet Engineering Task Force, Aug. 2006.
    • (2006) RFC 4604 (Proposed Standard), Internet Engineering Task Force
    • Holbrook, H.1    Cain, B.2    Haberman, B.3
  • 27
    • 84881315260 scopus 로고    scopus 로고
    • [Online]. Available
    • "VLAN security white paper," 2002. [Online]. Available: http://www.cisco.com/en/US/products/hw/switches/ps708/products white paper09186a008013159f.shtml
    • (2002) VLAN Security White Paper
  • 34
    • 4243337284 scopus 로고    scopus 로고
    • IEEE Std. 802.1AX
    • Link Aggregation, IEEE Std. 802.1AX, 2008.
    • (2008) Link Aggregation
  • 36
    • 72849151945 scopus 로고    scopus 로고
    • June retrieved Jan 17, 2011. [Online]. Available
    • S. Stasiukonis, "Social engineering, the USB way," June 2006, retrieved Jan 17, 2011. [Online]. Available: http://www.darkreading.com/ security/article/208803634/index.html
    • (2006) Social Engineering, the USB Way
    • Stasiukonis, S.1
  • 38
    • 84881318493 scopus 로고    scopus 로고
    • white paper, Trustwave [Online]. Available
    • "Global security report 2011," white paper, Trustwave, 2011. [Online]. Available: https://www.trustwave.com/downloads/Trustwave WP Global Security Report 2011.pdf
    • (2011) Global Security Report 2011
  • 39
    • 84881318666 scopus 로고    scopus 로고
    • Hacking layer 2: Fun with Ethernet switches
    • August 2002, retrieved Feb 15 [Online]. Available
    • S. Convery, "Hacking layer 2: Fun with Ethernet switches," Black Hat USA, August 2002, retrieved Feb 15, 2011. [Online]. Available: http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf
    • (2011) Black Hat USA
    • Convery, S.1
  • 40
    • 84881310224 scopus 로고    scopus 로고
    • Making unidirectional VLAN and PVLAN jumping bidirectional
    • Dec 2005, retrieved May 15 [Online]. Available
    • A. A. Vladimirov, "Making unidirectional VLAN and PVLAN jumping bidirectional," Full-disclosure mailing list, Dec 2005, retrieved May 15, 2011. [Online]. Available: http://lists.grok.org.uk/pipermail/fulldisclosure/ 2005-December/040333.html
    • (2011) Full-disclosure Mailing List
    • Vladimirov, A.A.1
  • 42
    • 84881311187 scopus 로고    scopus 로고
    • Online 2009, retrieved May 15 [Online]. Available
    • "VoIP hopper software," Online, 2009, retrieved May 15, 2011. [Online]. Available: http://voiphopper.sourceforge.net/
    • (2011) VoIP Hopper Software
  • 45
    • 84881313254 scopus 로고    scopus 로고
    • October 2011, retrieved Oct, 24, 2011. [Online]. Available
    • A. Coffman, "Simple DNS man in the middle attack for password phishing," October 2011, retrieved Oct 24, 2011. [Online]. Available: http://thecoffman.com/2011/10/20/simple-dns-manin-the-middle-attack-for- password-phishing/
    • Simple DNS Man in the Middle Attack for Password Phishing
    • Coffman, A.1
  • 47
    • 40949087228 scopus 로고    scopus 로고
    • Master's thesis, University of California Davis [Online]. Available
    • M. Marro, "Attacks at the data link layer," Master's thesis, University of California Davis, 2003. [Online]. Available: http://seclab.cs. ucdavis.edu/papers/Marro masters thesis.pdf
    • (2003) Attacks at the Data Link Layer
    • Marro, M.1
  • 54
    • 84881315115 scopus 로고    scopus 로고
    • Mitigating the threats of rogue machines802.1X or IPsec?
    • August 2005, retrieved Oct 11 [Online]. Available
    • S. Riley, "Mitigating the threats of rogue machines802.1X or IPsec?" Microsoft TechNet, August 2005, retrieved Oct 11, 2011. [Online]. Available: http://technet.microsoft.com/en-us/library/cc512611.aspx
    • (2011) Microsoft Tech Net
    • Riley, S.1
  • 56
    • 84884546992 scopus 로고    scopus 로고
    • white paper, Cisco Inc [Online]. Available
    • I. Dubrawsky, "Safe layer 2 security in-depth," white paper, Cisco Inc, 2004. [Online]. Available: http://www.cisco.com/warp/public/cc/so/ cuso/epso/sqfr/sfblu wp.pdf
    • (2004) Safe Layer 2 Security In-depth
    • Dubrawsky, I.1
  • 61
    • 84881314509 scopus 로고    scopus 로고
    • Pushing enterprise security down the network stack
    • Tech. Rep. [Online]. Available
    • R. Clark, N. Feamster, A. Nayak, and A. Reimers, "Pushing enterprise security down the network stack," Georgia Tech, Tech. Rep., 2009. [Online]. Available: http://hdl.handle.net/1853/30782
    • (2009) Georgia Tech
    • Clark, R.1    Feamster, N.2    Nayak, A.3    Reimers, A.4
  • 64
    • 34547663065 scopus 로고    scopus 로고
    • An architectural framework for data link layer security with security inter-layering
    • DOI 10.1109/SECON.2007.342975, 4147505, 2007 IEEE SoutheastCon
    • H. Altunbasak and H. Owen, "An architectural framework for data link layer security with security inter-layering," in SoutheastCon, 2007. Proceedings. IEEE. IEEE, Mar 2007, pp. 607-614. (Pubitemid 47208374)
    • (2007) Conference Proceedings - IEEE SOUTHEASTCON , pp. 607-614
    • Altunbasak, H.1    Owen, H.2
  • 66
    • 84881311260 scopus 로고    scopus 로고
    • white paper, Hewlett-Packard Development Company
    • "Hardening ProCurve swtiches," white paper, Hewlett-Packard Development Company, 2007.
    • (2007) Hardening ProCurve Swtiches
  • 75
    • 65249086073 scopus 로고    scopus 로고
    • Floodless in SEATTLE, a scalable Ethernet architecture for large enterprises
    • Oct
    • C. Kim, M. Caesar, and J. Rexford, "Floodless in SEATTLE, a scalable Ethernet architecture for large enterprises," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 3-14, Oct 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.4 , pp. 3-14
    • Kim, C.1    Caesar, M.2    Rexford, J.3
  • 78
    • 33749467476 scopus 로고    scopus 로고
    • Rethinking the service model: Scaling Ethernet to a million nodes
    • A. Myers, E. Ng, and H. Zhang, "Rethinking the service model: Scaling Ethernet to a million nodes," in Proc. HotNets. ACM Sigcomm, 2004.
    • (2004) Proc. HotNets. ACM Sigcomm
    • Myers, A.1    Ng, E.2    Zhang, H.3
  • 81
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Security Protocols, ser J. Malcolm, B. Christianson, B. Crispo, and M. Roe, Eds., Springer Berlin/Heidelberg 10.1007/10720107 24
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Protocols, ser. Lecture Notes in Computer Science, J. Malcolm, B. Christianson, B. Crispo, and M. Roe, Eds. Springer Berlin/Heidelberg, 1999, vol. 1796, pp. 172-182, 10.1007/10720107 24.
    • (1999) Lecture Notes in Computer Science , vol.1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.