期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2016
卷号:7
期号:2
页码:41-51
语种:English
出版社:Ayushmaan Technologies
摘要:In Local Area Network like hub, Switches, Bridges different devices are using to connect the network. The problems with the Hub are to broadcast all information to all computers. The bridge has less number of ports. The Switch overcomes this issue by using MAC Table and it also has large number of ports. We anticipated that the switch can provide about 90 percent security features by which we can secure our environment but the percent get reduced to 10 percent or less. We have a lot of vulnerabilities which weneed to overcome to secure our environment.The various Organizations are dealing with different issues of network vulnerabilitites. With a significant percentage of network attacks originating inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. So, It is important to find out different vulnerabilities of network and eliminate upto acceptable level.Security issues are addressed include ARP spoofing, MAC flooding, VLAN hopping, DHCP attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are confirmed or debunked, and specific security lockdown recommendations are given. Attack mitigation options include the Port Security, DHCP snooping, Dynamic ARP Inspection (DAI) functionality and following the VLAN Security recommendations.