A survey on backbone attack

Ebu Yusuf Güven, Mehmet Yavuz Yaǧci, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.

Original languageEnglish
Title of host publication7th International Symposium on Digital Forensics and Security, ISDFS 2019
EditorsAsaf Varol, Murat Karabatak, Cihan Varol, Sevginur Teke
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728128276
DOIs
StatePublished - Jun 2019
Externally publishedYes
Event7th International Symposium on Digital Forensics and Security, ISDFS 2019 - Barcelos, Portugal
Duration: Jun 10 2019Jun 12 2019

Publication series

Name7th International Symposium on Digital Forensics and Security, ISDFS 2019

Conference

Conference7th International Symposium on Digital Forensics and Security, ISDFS 2019
Country/TerritoryPortugal
CityBarcelos
Period06/10/1906/12/19

Keywords

  • Cyber attack
  • Datalink layer attack
  • Layer 2
  • Router
  • Switch

Fingerprint

Dive into the research topics of 'A survey on backbone attack'. Together they form a unique fingerprint.

Cite this