COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS
DOI:
https://doi.org/10.59743/aujas.v5i1.1645Keywords:
VLAN, DoS, Broadcast, LAN, TrunkAbstract
The separation of critical services from noncritical services can occur on layer two broadcast domain. Separation could involve the isolation of broadcast or collision domains through Virtual Local Area Networks VLANs. This helps reduce the risk of Address Resolution Protocol ARP storms during heavy scanning events or denial of service attacks DoS. The major threat on the network is DoS attacks which use the broadcast storm flooding as TCP syn flood to engage the servers. This paper demonstrate how VLANs could be used to reduce the impact of DoS attacks on the servers. The simulation was carried out using Cisco Packet Tracer 6.0.1. Two scenarios were presented, first one showed flooding the server before VLANs and second scenario showed how VLANs could reduce flooding the servers so using VLANs reduce the impact of DoS attacks as mentioned in scenario two.
References
A. Hameed and A. N. Mian, “Finding efficient VLAN topology for better broadcast containment,” in 2012 Third International Conference on The Network of the Future (NOF), 2012, pp. 1–6. DOI: https://doi.org/10.1109/NOF.2012.6464001
V. Pavani, I. L. Chandrika, and A. R. Krishna, “Local Area Network (LAN) Technologies,” Int. J. Innov. Technol. Explor. Eng. IJITEE Vol., vol. 1.
COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS
I. A. Alimi and A. O. Mufutau, “Enhancement of network performance of an enterprises network with VLAN,” Am. J. Mob. Syst. Appl. Serv., vol. 1, no. 2, pp. 82–93, 2015.
A. C. Odi, N. E. Nwogbaga, and N. O. Chukwuka, “The Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State University,” Int. J. Sci. Res., no. 7, pp. 2608–2615, 2015.
H. S. Hawedi, O. A. Bentaher, and K. E. Abodhir, “Using Access Control List against Denial of service attacks.”
A. M. H. Nur, “Performance Analysis of LAN and VLAN Using Soft Computing Techniques,” IOSR J. Electron. Commun. Eng., vol. 9, no. 6, pp. 10–16, 2014. DOI: https://doi.org/10.9790/2834-09641016
M. Baykara and R. DAŞ, “SoftSwitch: a centralized honeypot- based security approach using software-defined switching for secure management of VLAN networks,” Turk. J. Electr. Eng. Comput. Sci., vol. 27, no. 5, pp. 3309–3325, 2019. DOI: https://doi.org/10.3906/elk-1812-86
S. Vidya and R. Bhaskaran, “ARP storm detection and prevention measures,” Int. J. Comput. Sci. Issues IJCSI, vol. 8, no. 2, p. 456, 2011.
M. B. Lehocine and M. Batouche, “Flexibility of managing VLAN filtering and segmentation in SDN networks,” in 2017 International Symposium on Networks, Computers and Communications (ISNCC), 2017, pp. 1–6. DOI: https://doi.org/10.1109/ISNCC.2017.8071999
M. S. Islam, M. J. Hossain, and M. H. Kabir, “Virtualization of Campus LAN and analyzing traffic issues of these VLANs,” Int. J. Sci. Eng. Res., vol. 5, no. 1, 2014.
V.-G. Nguyen and Y.-H. Kim, “SDN-Based Enterprise and Campus Networks: A Case of VLAN Management.,” J. Inf. Process. Syst., vol. 12, no. 3, 2016.
Omran Ali Bentaher ،Hadya S. Hawedi ،Kaled E. I. Abodhir
S. E. Ul Haq and S. Parveen, “IMPLEMENTATION OF NETWORK ARCHITECTURE, ITS SECURITY AND PERFORMANCE ANALYSIS OF VLAN.,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 7, 2017. DOI: https://doi.org/10.26483/ijarcs.v8i7.3247
A. Mehdizadeha, K. Suinggia, M. Mohammadpoorb, and H. Haruna, “Virtual Local Area Network (VLAN): Segmentation and Security,” in The Third International Conference on Computing Technology and Information Management (ICCTIM2017), 2017, pp. 78– 89.
M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, “A survey of virtual LAN usage in campus networks,” IEEE Commun. Mag., vol. 49, no. 7, pp. 98–103, 2011. DOI: https://doi.org/10.1109/MCOM.2011.5936161
D. A. Aziz, “The Importance of VLANs and Trunk Links in Network Communication Areas.”
E. A. Blake, “Network security: VoIP security on data network--a guide,” in Proceedings of the 4th annual conference on Information security curriculum development, 2007, pp. 1–7. DOI: https://doi.org/10.1145/1409908.1409938
N. H. Prasad, B. K. Reddy, B. Amarnath, and M. Puthanial, “Intervlan Routing and Various Configurations on Vlan in a Network using Cisco Packet Tracer,” Int. J. Innov. Res. Sci. Technol., vol. 2, no. 11, pp. 749–758, 2016.
S. A. Rouiller, “Virtual LAN Security: weaknesses and countermeasures,” Available Uploads Askapache Com200612vlan-Secur.- 3 Pdf, 2003.
R. O. Verma and S. S. Shriramwar, “Security Optimization of VTP Model in an Enterprise VLAN,” IJECCE, vol. 4, no. 3, pp. 950–954, 2013.
D. J. Jingle and E. B. Rajsingh, “Defending IP spoofing attack and TCP SYN flooding attack in next generation multi-hop wireless networks,” Int. J. Inf. Netw. Secur., vol. 2, no. 2, p. 160, 2013. DOI: https://doi.org/10.11591/ijins.v2i2.1768
Prabhakaran Abraham Ali Ahmad Milad and Mustafa Almahdi Algaet, “Performance and Efficient allocation of Virtual Internet Protocol addressing in Next Generation Network Environment,” Aust. J. Basic Appl.
COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS
Sci., vol. 7(7), no. 827–832, pp. 827–832, 2013, [Online]. Available: http://ajbasweb.com/old/ajbas/2013/may/827-832.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 عمران علي بن طاهر ، هدية سليمان هويدي ، خالد احميد ابو ظهير
This work is licensed under a Creative Commons Attribution 4.0 International License.
The rights relate to the publication and distribution of research published in the Journal of Alasmarya University where authors who have published their articles in the Journal of Alasmarya University should Know how they can use or distribute their articles. They reserve all their rights to the published works, such as (but not limited to) the following rights:
- Copyright and other property rights related to the article, such as patent rights.
- Copyright on all open access article in Journal of Alasmarya published by Alasmarya Islamic University is retained by the author(s) and they can used in it's future works, including lectures and books, the right to reproduce articles for their own purposes, and the right to self-archive their articles..
- Authors grant Alasmarya Islamic University a license to publish the article and identify itself as the original publisher.
- Authors also grant any third party the right to use the article freely as long as its integrity is maintained and its original authors, citation details and publisher are identified.
The Creative Commons Attribution License 4.0 formalizes these and other terms and conditions of publishing articles