scholarly journals Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)

2018 ◽  
Vol 3 (2) ◽  
pp. 147
Author(s):  
Tamsir Ariyadi

Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN).

Author(s):  
Anton Andreev ◽  
Anton Shabaev

A lot of network management tasks require a description of the logical and physical computer network topology. Obtaining such a description in an automatic way is complicated due to the possibility of incompleteness and incorrectness of the initial data on the network structure. This article provides a study on the properties of incomplete initial data on network device connectivity on the link layer. Methods for generalized handling of the heterogeneous input data on the link layer are included. We describe models and methods for deriving a missing part of the data, as well as the condition in which it is possible to get a single correct network topology description. The article includes algorithms for building a link layer topology description from incomplete data when this data is possible to fulfill up to the required level. Also, we provide methods for detecting and resolving an ambiguity in the data and methods for improving incorrect initial data. Tests and evaluations provided in the article demonstrate the applicability and effectiveness of the build methods for discovering various heterogeneous real-life networks. Additionally, we show advantages of the provided methods over the previous analogs: our methods are able to derive up to 99\% data on link layer connectivity in polynomial time; able to provide a correct solution from an ambiguous data.


2014 ◽  
Author(s):  
M. Mahalingam ◽  
D. Dutt ◽  
K. Duda ◽  
P. Agarwal ◽  
L. Kreeger ◽  
...  

2014 ◽  
Vol 989-994 ◽  
pp. 4215-4218
Author(s):  
Long Qian

With the development of household appliances, the short of communication among them is more and more becoming a problem. At present there is no central point of control among the traditional home appliances, and we cannot access them through Internet. To solve these issues, home network is proposed to connect all the appliances, home PC and portable devices together using network technology. Controlling all the appliances through one single node ( the home network gateway), home network makes life much simpler and convenient. There are several local area network technologies applicable to home network. Bluetooth technology is chosen in this paper as the home networking technology due to its many advantages over others. The implementation scheme of home control sub-network based on Bluetooth serial part profile ( SPP) and the standards of Home Network Platform in China is proposed. According to actual application fields, the communication protocol architecture for this scheme is established by using appliance control protocol promoted by the manufacturers and universal device control protocol ( UDCP) over SPP. Many management functions of appliance terminals are realized such as appending, login, operation, logout and alarming. Implementation methods of appliance terminal based on an entirely embedded single-chip manner and mobile control terminal which is realized by computer simulation are proposed. Analysis and solution of baud rate error brought by inaccurate crystal frequencies are presented. Further discussion about applying ad hoc technology to home control sub-network is carried out.


Author(s):  
María Genoveva Moreira Santos ◽  
Pedro Antonio Alcívar Marcillo

There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments. On this occasion we will focus on the data link layer of the OSI model, which is where controls have begun to be implemented at level of protocols. The tools that are used in the research facilitate the implementation of a virtual laboratory, which consists of a base operating system (windows) in which virtualbox is installed to mount linux mint, which will generate attacks; while in VMware, we installed a virtual machine that allows you to add the image of a switch to our network simulation software (GNS3), which integrates all the components. The tests were able to identify the vulnerabilities in MAC, ARP, VLAN and STP, and then to proceed to patch these security aws. Keeping the setting by default or ignoring the characteristics of network equipment are usually the reasons why these vulnerabilities exist. Finally, it was proved how easy it can be to run an attack and at the same time to implement security measures on the layer 2 of the OSI.


Sign in / Sign up

Export Citation Format

Share Document