Abstract
The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.
| Original language | English |
|---|---|
| Title of host publication | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 |
| Editors | Asaf Varol, Murat Karabatak, Cihan Varol, Sevginur Teke |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781728128276 |
| DOIs | |
| State | Published - Jun 2019 |
| Externally published | Yes |
| Event | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 - Barcelos, Portugal Duration: Jun 10 2019 → Jun 12 2019 |
Publication series
| Name | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 |
|---|
Conference
| Conference | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 |
|---|---|
| Country/Territory | Portugal |
| City | Barcelos |
| Period | 06/10/19 → 06/12/19 |
Funding
This publication was carried out in Internet of Things Security and Evaluation Center (ISTEC) and Istanbul Digital Forensics Laboratory (IDFL) sponsored by the Istanbul Development Agency.
Keywords
- Cyber attack
- Datalink layer attack
- Layer 2
- Router
- Switch
Fingerprint
Dive into the research topics of 'A survey on backbone attack'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver