scholarly journals An Algorithm of Physical Network Topology Discovery in Multi-VLANs

Author(s):  
Xiaobo Ma ◽  
Tingting Yu
2014 ◽  
Vol 496-500 ◽  
pp. 2134-2137
Author(s):  
Hui He ◽  
Chi Xin Li ◽  
Cheng Ying Gong

Network topology is the core of configuration management and the infrastructure of resource management.And it is based on the detection of a network failure and the analysis of network performance.This requires the network topology complete, accurate and friendly interface with visualization.This article describes the classification of the physical network topology discovery.Based on Bridge-MIB and MIB-II of SNMP devices, designed topology discovery algorithm in data link layer and network layer.Test results show that the algorithm can accurately find the device and connection on the network layer and the data link layer.


2010 ◽  
Vol 2010 (1) ◽  
pp. 172-177 ◽  
Author(s):  
Song Chen ◽  
Shan Wang ◽  
Ming-tian Zhou

2015 ◽  
Vol 94 (3) ◽  
pp. 415-430 ◽  
Author(s):  
Amir Azodi ◽  
Feng Cheng ◽  
Christoph Meinel

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Li-Der Chou ◽  
Chien-Chang Liu ◽  
Meng-Sheng Lai ◽  
Kai-Cheng Chiu ◽  
Hsuan-Hao Tu ◽  
...  

Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of each LLDP frame to determine whether a topology discovery via man-in-the-middle attack exists. This study also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using topology discovery via injection attack to generate fake links and topology discovery via flooding attack to cause network routing or switching abnormalities.


Author(s):  
Fawad Nazir ◽  
Tallat Hussain Tarar ◽  
Faran Javed ◽  
Hiroki Suguri ◽  
Hafiz Farooq Ahmad ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document