【24h】

SNMP-Based Detection of VLAN Hopping Attack Risk

机译:基于SNMP的VLAN跳跃攻击风险检测

获取原文

摘要

Virtual local area network (VLAN) is commonly used to divide a big network into several small network segments. Also, many adopt VLAN for dissecting LANs in order to prevent communications between different VLANs for security and management purposes. It is known that inserting an additional VLAN tag into Ethernet frames, referred to as VLAN hopping attack, can bypass the VLAN-based network separation. There are two preconditions for the attack. The first condition is that a hacker needs to know the destination's VLAN identification number and the second condition is that the attacking system needs to be connected a switch's trunk port that is used for connecting a switch. In this study, we propose an SNMP (Simple Network Management Protocol)-based detection method to effectively find a port and an MAC address that meet the second condition before a VLAN hopping attack begins. Since SNMP is implemented by most network components, our method can be easily deployed to the current VLAN networks.
机译:虚拟局域网(VLAN)通常用于将大网络划分为几个小型网络段。此外,许多人采用VLAN解剖LAN,以防止不同VLAN之间的通信以供安全和管理目的。众所周知,将附加的VLAN标记插入以太网帧,称为VLAN跳跃攻击,可以绕过基于VLAN的网络分离。攻击有两个先决条件。第一个条件是黑客需要知道目的地的VLAN识别号码,第二个条件是攻击系统需要连接用于连接交换机的交换机的主干端口。在这项研究中,我们提出了一种基于SNMP(简单的网络管理协议)的检测方法,以有效地找到满足第二个条件之前的端口和MAC地址在VLAN跳跃攻击开始之前。由于SNMP由大多数网络组件实现,因此我们的方法可以轻松部署到当前的VLAN网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号