Home   >   CSC-OpenAccess Library   >    Manuscript Information
Enhance the Security and Performance of IP over Ethernet Networks by Reduction the Naming System Design
Waleed Khalid Hussein, Longzheng Cai, Shaymaa A. Alyawer
Pages - 177 - 194     |    Revised - 15-11-2012     |    Published - 31-12-2012
Volume - 4   Issue - 5    |    Publication Date - December 2012  Table of Contents
IP protocol, MAC address, Ethernet, ARP protocol, Security, Performance
In this research, we investigate the weak link between two protocols, IP protocol and Ethernet protocol. IP over Ethernet network has become the major network used by Internet. In this network, still the data link layer performance and security problems not adequately addressed yet. The findings of this research lead us to propose a modification, by making a reduction on current naming architecture to improve the network performance and security. The proposed architecture will be evaluated by a theoretical analysis.
CITED BY (2)  
1 Alzubaidi, W. K., Cai, L., Alyawer, S. A., & Siebert-Cole, E. (2015). Visibility for Network Security Enhancement in Internet Protocol Over Ethernet Networks. In Advanced Computer and Communication Engineering Technology (pp. 277-287). Springer International Publishing.
2 Alzubaidi, W. K., Cai, L., & Alyawer, S. A. (2014, June). Enhance the performance of ICMP protocol by reduction the IP over ethernet naming architecture. In Computer and Information Sciences (ICCOINS), 2014 International Conference on (pp. 1-6). IEEE.
1 Google Scholar 
2 CiteSeerX 
3 Scribd 
4 SlideShare 
5 PdfSR 
802.1x-2004, http://www.ieee802.org/1/pages/802.1x-2004.html.
Altunbasak, H., Krasser, S., Owen, H., Sokol, J., Grimminger, J.,andHuth, H.-P., “Addressing the weak link between Layer 2 and Layer 3 in the Internet architecture," in Proc. of the 29th Annual IEEE Conference on Local Computer Networks (LCN), (Tampa, Florida), November2004.
B.D.Schuymer.ebtables: Ethernet bridge tables,Mar.2006.http://ebtables.sourceforge.net.
Bashir, M. S., “ARP Cache Poisoning with Ettercap" August 2003Available at http://www.giac.org/practical/GSEC/Mohammad Bashir GSEC.pdf.
Behrouz A. Forouzan, “TCP/IP Protocol Suite”, Fourth Edition, Tata McGraw Hill, pp. 220-223, 2010.
C. Schluting. Configure your Catalyst for a more secure layer 2, Jan. 2005.http://www.enterprisenetworkingplanet.com/netsecur/article.php/3462211.
C. Schluting. Configure your Catalyst for a more secure layer 2, Jan. 2005.http://www.enterprisenetworkingplanet.com/netsecur/article.php/3462211.
Cisco Systems. Configuring Dynamic ARP Inspection, chapter 39, pages 39:1–39:22. 2010.Catalyst 6500 Series Switch Cisco IOS Sofware Configuration Guide, Release 12.2SX.
Craig A. Shue, Minaxi Gupta, An Internet without the Internet protocol, Computer Networks 2010 54 (2010) 3232–3245, http://dx.doi.org/10.1016/j.comnet.2010.06.009.
D. Bruschi, A. Ornaghi, and E. Rosti. S-ARP: A secure address resolution protocol. In Proceedings of the 19th AnnualComputer Security Applications Conference (ACSAC’03),Dec. 2003.
Hayriye C. Altunbasak, “Layer 2 Security Inter-Layering In Networks,” Thesis dissertation,Georgia Institute of Technology, Dec. 2006.
M. Barnaba. anticap. http://www.antifork.org/viewcvs/trunk/anticap, August/2011.
Microsoft Windows 2008 TCP/IP Protocols and Services Technical Reference, Thomas Lee and Joseph Davies, Chapter 3: Adress Resolution Protocol (ARP).
NathNayak, G., GhoshSamaddar, S., “Different Flavours of Man-In-The-Middle Attack,Consequences and Feasible Solutions”, Computer Science and Information Technology(ICCSIT), 2010 3rd IEEE International Conference.
Plummer, D. C., “Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware." IETF RFC 826,November 1982.
S. Whalen. An introduction to ARP spoofing.2600: The Hacker Quarterly, 18(3), Fall 2001 http://www.node99.org/projects/arpspoof/arpspoof.pdf.
S.J. Prowell, R. Kraus, and M. Borkin, “Seven Deadliest Network Attacks”, Syngress, 2010.
S.Vidya, N.Gowri, R.Bhaskaran, “ARP traffic and Network Vulnerability”, in proceedings of INDIACOM-2011, conducted by BVICAM, New Delhi, India, page – 619 and in CD.
S.Vidya, R.Bhaskaran, “A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack”, IJCSI International Journal of Computer Science Issues,Vol.8, Issue 5, September 2011, ISSN(Online): 1694-0814, pp-173-179.
Sanjeev Kumar, Orifiel Gomez, “Denial of Service due to direct and Indirect ARP storm attacks in LAN environment”, Journal of Information Security, 2010, 1, pp. 88-94,doi:10.4236/jis.2010.12010 Published online October 2010 (http://www.SciRP.org/journal/jis).
Static ARP more dynamic than you might think on, http://www.chrismc.de, last access 15/8/2011.
T. Bradley, C. Brown, and A. Malis. “Inverse address resolution protocol”, Sept. 1998. RFC 2390.
TJ O’Connor, “Detecting and Responding to Data Link Layer Attacks”, SANS Institute InfoSec Reading Room, Oct 13, 2010,http://www.sans.org/reading_room/whitepapers/detection/detecting-responding-data-linklayer-attacks_33513,2010.
W. Lootah, W. Enck, and P. McDaniel. TARP: Ticket-based address resolution protocol. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC ’05),Dec. 2005.
Xiangning HOU, Zhiping JIANG and Xinli TIAN. The detection and prevention for ARP Spoofing based on Snort. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
Mr. Waleed Khalid Hussein
University of Tun Abdul Razak - Malaysia
Dr. Longzheng Cai
- Malaysia
Miss Shaymaa A. Alyawer
- Iraq